What Integrates with Red Hat Cloud Suite?
Find out what Red Hat Cloud Suite integrations exist in 2025. Learn what software and services currently integrate with Red Hat Cloud Suite, and sort them by reviews, cost, features, and more. Below is a list of products that Red Hat Cloud Suite currently integrates with:
-
1
Snyk
Snyk
$0 384 RatingsSnyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk is a developer security platform that automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. -
2
Atlantic.Net
Atlantic.Net
$320.98 per month 34 RatingsOur hosting solutions are designed to allow you to focus on your core business and applications, while meeting all security, privacy and compliance requirements. Our Compliance Hosting solutions are ideal for healthcare and financial services organizations that require high levels of security for their data. Atlantic.Net compliance hosting solutions are certified and audited independently by third-party auditors. They meet HIPAA, HITECH PCI, PCI or SOC requirements. Our proactive, results-oriented approach to digital transformation will benefit you from the first consultation through to ongoing operations. Our managed services will give you a clear advantage to make your company more productive and efficient. You can address the regulatory requirements of your industry by creating a HIPAA-, HITECH, PCI DSS, and GDPR-compliant environment. -
3
Consistent app services and security policies are essential for effective management, orchestration and visibility. All your BIG-IP devices can be managed from one unified platform. Effective management of apps and the devices that power them is a challenge, as 87 percent of organizations deploy apps in multiple cloud and architectures. The 2020 State of Application Services Report found that none of the respondents could confidently state the number of applications they have running in their deployment environments. With ever-expanding app portfolios and the additional appliances, this management challenge is only increasing. All of this is done from a single, role-specific pane of glass that can analyze, troubleshoot and auto-scale every app, F5 device, and service in any environment.
-
4
Our unified cloud solution for data and analytics enables business users to connect data with business contexts and unlock insights. SAP Data Warehouse Cloud unites data and analytics in a cloud platform that includes data integration, data warehouse, data warehouse, as well as analytics capabilities. This will help you unleash your data-driven enterprise. Built on the SAP HANA Cloud database, this software-as-a-service (SaaS) empowers you to better understand your business data and make confident decisions based on real-time information. You can connect data across multi-cloud and local repositories in real time, while keeping the context of your business. SAP HANA Cloud enables you to gain insights and analyze real-time data at lightning speed. All users can access self-service capabilities to connect, model and visualize their data securely in an IT-governed environment. Use pre-built templates, data models, and industry content.
-
5
Pliant
Pliant.io
12 RatingsPliant's solution to IT Process Automation streamlines, secures, and simplifies the way teams build and deploy automation. Pliant will reduce human error, ensure compliance and increase your efficiency. Pliant allows you to integrate existing automation and create new automation using single-pane orchestration. You can ensure compliance with consistent, practical, built-in governance. Pliant has abstracted thousands from vendor APIs to create intelligent actions blocks that allow users to drag-and drop blocks rather than writing lines of code. Citizen developers can create consistent and meaningful automation across platforms and services in minutes. This allows them to maximize the value of the entire technology stack from one platform. We can add APIs in as little as 15 business days. This is an industry-leading timeframe. -
6
ExpanDrive
ExpanDrive
$49.95 4 RatingsThe Smartest Way To Connect to the Cloud Access to cloud storage is seamless from any application. ExpanDrive allows you to add cloud storage such as Google Drive, Dropbox and Amazon S3, SFTP/SSH, Box, OneDrive, OneDrive, Sharepoint, Finder, Explorer, and OneDrive. You don't need an additional app to move data around. ExpanDrive connects cloud storage with every application on your computer, including Office 365 and Photoshop. You can choose files to be accessed offline and work without an Internet connection. When you return online, syncronization to the cloud occurs automatically. Other files can be accessed from the cloud on-demand, using no disk space. We are here to help you if major storage providers have left. ExpanDrive provides native cloud storage access to Linux for all major Linux distributions including Ubuntu, Linux Mint and CentOS. ExpanDrive integrates with Spotlight Search for Mac and Windows file searches. You can quickly search your remote storage to find what you are looking for. -
7
Telegraf
InfluxData
$0Telegraf is an open-source server agent that helps you collect metrics from your sensors, stacks, and systems. Telegraf is a plugin-driven agent that collects and sends metrics and events from systems, databases, and IoT sensors. Telegraf is written in Go. It compiles to a single binary and has no external dependencies. It also requires very little memory. Telegraf can gather metrics from a wide variety of inputs and then write them into a wide range of outputs. It can be easily extended by being plugin-driven for both the collection and output data. It is written in Go and can be run on any system without external dependencies. It is easy to collect metrics from your endpoints with the 300+ plugins that have been created by data experts in the community. -
8
IRI FieldShield
IRI, The CoSort Company
IRI FieldShield® is a powerful and affordable data discovery and de-identification package for masking PII, PHI, PAN and other sensitive data in structured and semi-structured sources. Front-ended in a free Eclipse-based design environment, FieldShield jobs classify, profile, scan, and de-identify data at rest (static masking). Use the FieldShield SDK or proxy-based application to secure data in motion (dynamic data masking). The usual method for masking RDB and other flat files (CSV, Excel, LDIF, COBOL, etc.) is to classify it centrally, search for it globally, and automatically mask it in a consistent way using encryption, pseudonymization, redaction or other functions to preserve realism and referential integrity in production or test environments. Use FieldShield to make test data, nullify breaches, or comply with GDPR. HIPAA. PCI, PDPA, PCI-DSS and other laws. Audit through machine- and human-readable search reports, job logs and re-ID risks scores. Optionally mask data when you map it; FieldShield functions can also run in IRI Voracity ETL and federation, migration, replication, subsetting, and analytic jobs. To mask DB clones run FieldShield in Windocks, Actifio or Commvault. Call it from CI/CD pipelines and apps. -
9
Azure NetApp Files
NetApp
$0.14746Microsoft Azure native, high-performance file storage service for core business applications. Azure NetApp Files (ANF) makes it super-easy for enterprise LOB and storage professionals to migrate and run complex, performance-intensive and latency-sensitive applications with no code-change. ANF is used widely as the underlying shared storage service in these scenarios. Azure supports multiple protocols, allowing for seamless "lift and shift" of both Linux and Windows applications. Multiple performance tiers can be aligned with workload performance requirements. Deep integration into Azure allows for seamless and secure Azure experiences with minimal learning or management overhead. Leading certifications such as SAP HANA, GDPR and HIPAA allow migration of the most challenging workloads to Azure. -
10
Granulate
Granulate
$0.0045 per core per hourOptimize your workloads for improved performance, lower costs and reduced response times - with no code changes needed Granulate will boost your app’s performance by adapting OS resource management to your individual workloads. Whether you’re using on-prem, hybrid or cloud, Granulate’s real-time and continuous optimization solutions will provide impactful results. Granulate is able to achieve autonomous, continuous workload optimization by following these 3 steps: LEARNING - Installed via Daemonset, Dockerfile or CLI, the agent passively learns your service’s data flows, processing patterns and resources contentions. OPTIMIZING - Once activated, the agent will immediately begin tailoring resource scheduling decisions to your service, resolving inefficiencies and increasing performance. REDUCING COSTS - Your workload’s performance gains are automatically leveraged to reduce cluster size and save on Azure compute costs. Granulate is simple to deploy and offers a “set it and forget it” user experience. With Granulate you get results effortlessly with no R&D efforts involved. -
11
Alibaba Cloud SSL Certificates Service
Alibaba Cloud
$199 per yearAlibaba Cloud SSL Certificates Service allows customers directly to apply, buy and manage SSL certificates. This service is available in cooperation with qualified certificate authorities. Customers can choose the expected certificate authority and its products from this platform to receive full-site HTTPS security. For optimal cost efficiency, manage digital certificates from a single platform. All major Linux and Windows operating systems are supported, as well as the Alibaba Cloud network, VPC, hybrid clouds, and traditional IDC environments. Full-site HTTPS can be implemented with minimal cost using one platform that allows you to manage multiple digital certificates that can all be used to access multiple Alibaba Cloud services. You can view certificates used by different cloud businesses and place your own orders on a single platform. -
12
Comprehensive DDoS protection at the application layer and network level. Flexible and scaleable for hybrid, out-of-band and inline deployments. Traditional DDoS solutions are limited to a narrow range. They are only partially effective because they black-hole or limit the rate at which legitimate users can connect to them in network layer (or flood attack) attacks. They are blind to SSL traffic and dependent upon their placement in the network during application layer attacks. When the Internet bandwidth is cut off, all on-premise defenses are rendered ineffective. F5 BIG-IP DDoS Hybrid Defender offers a deeper level of protection. It is the only multi-layered defense that protects against sophisticated application attacks and blended network attacks. It also enables full SSL encryption, anti-bot capabilities and advanced detection methods all in one appliance.
-
13
Alibaba Cloud Anti-Bot Service
Alibaba Cloud
$707.55 per monthAnti-Bot Service provides complete bot defense for Web apps, HTML5 websites and mobile apps. It can reduce the risk of specific vulnerabilities. Anti-Bot Service can be used in the following situations: online scalping, flight seating occupancy, core API exploitation, user enumeration and user enumeration. Anti-Bot Service, a SaaS-based reverse proxy technology solution, allows you to create custom protection policies to control malicious traffic. The console also allows you to view the status of your protection. Protects the Web, mobile apps, as well as APIs, with comprehensive anti-bot protection. Protect yourself with easy access configurations. No code changes are required on the server side. It provides large amounts of security threat information and timely updates protection policies against attacks. Filters and identifies malicious traffic without affecting user experience. -
14
Scuba Database Vulnerability Scanner. Scuba is a free tool that reveals hidden security risks. Check enterprise databases for potential vulnerabilities and misconfigurations. Know the risks to your database. Get advice on how to address identified issues. Scuba is available for Windows, Mac and Linux (x32) and Linux (x64). It offers over 2,300 assessment tests for Oracle and Microsoft SQL, SAP Sybase and IBM DB2 as well as MySQL. Scuba scans enterprise databases for security flaws and configuration flaws. It is free and allows you to identify potential security risks. It contains more than 2,300 assessments for Oracle, Microsoft SQL Server and SAP Sybase. Scuba scans can be performed from any Windows, Mac, or Linux client. A typical Scuba scan takes between 2 and 3 minutes depending on the size of your database, users, groups, and network connection. There are no other requirements or pre-installation.
-
15
Tidal Migrations
Tidal Migrations
$10000 per yearTidal Migrations is the right choice for all stages of a customer's cloud journey. From capturing organizational goals and performing portfolio analysis, to optimizing applications in the cloud, Tidal Migrations is there for you. It is only a small part of what you need for cloud migration assessment that you know what operating systems and server platforms your current use. Tidal Migrations offers Application-Centric discovery to give you the data-driven insights needed to replatform or refactor your applications in the cloud. Tidal's cloud migration tools will analyze your web technologies, configurations, database usage, and configurations. You can also perform static code analysis on custom applications. Data is more than technical. The platform includes an interview process that rounds out data by adding business value, operational costs, privacy requirements and other considerations. -
16
NetApp Cloud Insights
NetApp
$6 per monthYou can control the performance and utilization for your cloud workloads. NetApp Cloud provides complete visibility into your infrastructure, applications, and more. Cloud Insights allows you to monitor, troubleshoot, and optimize all of your resources and applications across the entire technology stack, on-prem and in the cloud. With automated responses to threats and early detection, ransomware can be prevented from your most valuable business asset, data. Alert your organization to potential misuse and theft of intellectual property by malicious individuals, both internal or external. Auditing access to and patterns of usage to critical corporate data, whether on-premises or in cloud, can help ensure compliance. Full-stack visibility across infrastructure and applications, from the public cloud to your datacenter, all in one location. You don't have to search for new monitoring tools each time a platform is added to your organization. -
17
WebStorm
JetBrains
$129 per user per yearWebStorm provides integrated development environments for JavaScript and other related technologies. It works in the same way as other JetBrains IDEs. It automates repetitive work and helps you to handle more complex tasks. The IDE runs dozens of code inspections while you type, detecting potential issues and helping you write more reliable and maintainable codes. You can refactor your entire codebase with just a few clicks. This also makes it easy to implement large structural changes. You can get right to coding with all the necessary tools for JavaScript development. WebStorm makes it easy to be more productive and more creative while WebStorm does all the mundane work. Are you afraid of breaking something in Git or losing important changes? Or breaking something by renaming a component in your entire project. WebStorm will make these and other difficult tasks easier so you can concentrate on the bigger picture. -
18
SAP Data Intelligence
SAP
$1.22 per monthData intelligence can transform data chaos into data value. Disjointed data assets can be connected, discovered, enriched, and orchestrated to provide actionable business insights at an enterprise scale. SAP Data Intelligence provides a comprehensive data management solution. It is the data orchestration layer within SAP's Business Technology Platform. It transforms distributed data into vital data insights and delivers innovation at scale. Integrate across the IT landscape to provide intelligent, relevant and contextual insights for your users. Integrate and orchestrate large data volumes and streams at scale. Machine learning enables you to streamline, operationalize, manage, and govern innovation. Comprehensive metadata management rules optimize governance and reduce compliance risk. Disjointed data assets can be connected, discovered, enriched, and orchestrated to provide actionable business insights at enterprise level. -
19
Azure Hybrid Benefit
Microsoft
$2,135.25 per monthAzure Hybrid Benefit allows you to reduce costs by running your workloads in cloud. It works by allowing you to use your on-premises Software Assurance-enabled Windows Server or SQL Server licenses on Azure. This benefit is now available for RedHat and SUSE Linux subscriptions. You can save up to 85 percent on the standard pay-as you-go rate when you bring your Windows Server or SQL Server licenses from on-premises to Azure. Combine the Azure Hybrid Benefit with reservation pricing and extended security updates to get the lowest cost of ownership. Existing SQL Server licenses can be used in platform-as-a-service (PaaS), environments. Azure Hybrid Benefit allows you to bring your existing on-premises Windows Server or SQL Server licenses with active Software Assurance subscriptions to Azure. You can save up to 85 percent over standard pay-as you-go rates while still enjoying the lowest cost ownership. -
20
IRI CellShield
IRI
$35 one-time paymentIRI CellShield®, protects sensitive information in Microsoft Excel®, allowing you to comply data privacy laws. You can protect your columns with reversible or non-reversible masking options. CellShield protects your data, no matter how many sheets they are. Multiple search methods are available to locate and report on PII across the LAN. Protect it all at once with CellShield. Intuitive graphical dialogs allow you to classify and mask it. CellShield's core technology uses the award-winning IRI FieldShield flat file and database data masking product. Data that is hidden in one platform can be seen in another. CellShield EE, the only fully-featured professional data discovery, masking and auditing package for Excel 2010, 2016, and 2019 (plus Office 365 workbooks) in your LAN, is available. CellShield EE goes beyond the security and scope a single password can provide by combining and automating all of these additional capabilities. -
21
Your network must be prepared for the future with the pervasiveness of mobile devices and the Internet of Things. BIG-IP Policy Enforcement Manager is a policy enforcement function that allows you to have the flexibility and control you need, while still delivering a reliable customer experience. Services can be implemented based on subscriber level according to plan, device, and location. You'll be able not only to identify who should have access to what and when but also to collect data with network visibility. You can create relevant plan tiers, offer new, over-the top services based upon user behavior patterns, and then use BIG-IP PEM to enforce those plans. Your customers require a reliable, fast, and accessible network. BIG-IP PEM can make customers happier by providing smarter traffic steering, sophisticated policy management and improved network functions. Happy customers will stick with you longer, which will result in lower churn and higher revenue.
-
22
Diadem
Diadem
$2 per monthDiadem Technologies is one of India's top cloud service providers. We offer cloud, dedicated, and hybrid hosting solutions for clients all over the world. You can host your email ids with us on Zimbra Cloud, or go Hybrid using O365 or G Suite with Zimbra for a cost-effective solution that doesn't compromise on performance or features. Diadem Technologies, an ISO 27001-certified cloud service provider, hosts and manages its network, hardware and scalable platform at India's only Uptime IDC Tier IV. Our hosting solutions include managed support, DR backups, and security by our experienced admin team. Our experts are available 24/7 to assist you in any way that is needed. We understand the urgency of your business. Our automation platform manages your hosted assets and we are always available by phone or email to assist you. TIER IV Datacenter, ISP multihoming and redundant network to avoid downtime. -
23
Imperva API Security
Imperva
Imperva API Security protects APIs with an automated security model that detects vulnerabilities and protects them from exploitation. On average, organizations manage 300 APIs. Imperva's API Security increases your security posture by automatically creating a positive security model of every API swagger file uploaded. APIs are being produced faster than security teams can review them, influence them, and sign off before they go into production. Imperva's API Security allows your teams to stay ahead via automation. Imperva API Security gives you the power to empower your approach by adjusting your API security rules to meet your needs. This ensures full OWASP API coverage, and allows visibility for all security events per API point. Simply upload the OpenAPI specification file from your DevOps team to API Security and Imperva will automatically create a positive security model. -
24
ArrowChat
ArrowChat
$45 one-time paymentArrowChat allows users to text and video chat with one another using ArrowChat. Install chat on any website in minutes. ArrowChat is a self-hosted chat software that uses PHP script and jQuery. It is located at the bottom of this page. Take a look! When users log in to your website, our chat will automatically log them in. No extra coding! Users can be retrieved and displayed with full support in UTF-8 languages. ArrowChat will retrieve a user's profile URL and provide it to other users. Our chat software will automatically determine the avatar system and display the user's avatar. As users add and remove friends to their online user list, the online user list will be updated. You can limit ArrowChat features based on a user group from our admin panel. ArrowChat also has a mobile version. The chat will pop-up for users visiting your site from their mobile devices. -
25
Ottomatik
Ottomatik
$14 per monthProtection against everything that could go wrong. Data centerfires, accidental bad database queries, malicious hackers & more. We get it, accidental drop queries happen. It takes only 2 minutes to correct your mistakes and restore the database whenever you need it. Let us take care of your software development while you focus on your database storage with automated backups. Easy setup is possible by copying and pasting a command line installation. It takes less than 2 minutes to set up. You can set up your backup process to backup your data securely in the cloud. No more worrying about data loss. You can quickly recover your data from the database server with a single click. You can either integrate your storage servers (Amazon S3, Dropbox or Drive) and store your backup files there, or you can use our database servers for an additional fee. -
26
Kong Mesh
Kong
$250 per monthKuma Enterprise Service Mesh based on Kuma to multi-cloud and multi cluster on Kubernetes as well as VMs. You can deploy with one command. With built-in service discovery, connect to other services automatically. This includes an Ingress resource as well as remote CPs. Support for any environment, including multicluster, multicloud, and multiplatform on Kubernetes as well as VMs. Native mesh policies can be used to accelerate initiatives such as zero-trust or GDPR, and improve the efficiency and speed of each application team. A single control plane can scale horizontally to multiple data planes, support multiple clusters, or even hybrid service meshes that run on Kubernetes and both VMs. Envoy-based ingress deployments on Kubernetes or VMs can simplify cross-zone communication. You can collect metrics, trace and logs for all L4-L7 traffic using Envoy's 50+ observability charts. -
27
Quickwork
Quickwork
$20 per monthQuickwork is used by enterprises to create simple and complex workflows. It also allows them to create and publish APIs that are secure, and to manage conversational interactions between employees, customers, and partners. This helps to provide an excellent user experience. Quickwork is an all-in one platform that provides the tools and services needed to build powerful and scalable integrations. It also offers serverless APIs and conversational experiences. Drag and drop applications to create powerful integrations. No need to write a line of code. You can choose from 1000s of apps for business, consumer, analytics, messaging and IoT. Quickwork's API Management allows you to convert any workflow into an REST API in a single click. Our serverless infrastructure allows you to scale your APIs elastically and securely. Create and manage real-time messaging and conversational workflows across multiple channels with human agents, IoT devices, and chatbots. -
28
Betterscan.io
Betterscan.io
€499 one-time paymentReduce MTTD & MTTR by using full coverage within minutes. DevSecOps Toolchain across all environments. Implementing and collecting evidence for your continuous security. Unified and deduplicated across the layers we orchestrate. One line for adding several thousand checks plus AI. We built it with security in mind and avoided common security mistakes. Understands modern technologies. All are accessible via REST API. Lightweight and fast, easily integrated with CI/CD. You can host it yourself for 100% transparency and code control, or you can run the source-available binary only within your own CI/CD. Use a solution that is available as source code for complete transparency and control. Simple setup, no need to install software, compatible with a wide range of programming languages. It detects over a thousand code and infrastructure problems and counting. You can review issues, mark false positives and collaborate on issues. -
29
Speedscale
Speedscale
$100 per GBValidate your app's performance and quality with real-world traffic scenarios. Preview code performance to quickly identify problems and ensure your app is running optimally when the time comes to release. To better prepare for production, mimic real-life scenarios, simulate load, and create intelligent simulators of third-party or internal backend systems. You don't need to create expensive new environments every time you test. Cloud costs are further reduced by the autoscaling feature. You can ship more code faster by avoiding complex frameworks, manual test scripts, and homegrown frameworks. You can be confident that your new code changes will handle high traffic scenarios. Protect the customer experience, prevent major outages and meet SLAs. Simulate internal and third-party backends to ensure more reliable and affordable testing. No need to create expensive, end-toend environments that can take days to deploy. Migrate seamlessly off legacy architecture without affecting the customer experience. -
30
Licenseware
Licenseware
€0.5 per device per monthAutomated licensing management for any data sources. With a fast and reliable analysis, you can optimize your software costs and avoid audit exposure. Reduce your IT costs and risks to the minimum by optimizing them. Automated license requirement analysis using Microsoft deployment data. Cost optimization for hybrid organizations based on data. Transform MLS data and entitlements into clear license inventories, compliance reports and more. Visibility increases your risk by reducing it. Automate the analysis of Oracle DB usage, and determine license requirements. Identify cost reduction scenarios at a glance. Automate the Java license analysis and gain visibility into installed versions, editions and components. Automate the analysis of middleware usage, bundling and license requirements. More control, greater insight, and reduced compliance risk. RHEL subscriptions can be optimized and assessed. It provides insight into subscription usage and helps identify cost-savings. -
31
Citus
Citus Data
$0.27 per hourCitus combines the Postgres you know and love with the power of distributed tables. 100% open source. Now with schema-based, row-based, and Postgres 16 support. Scale Postgres using data and queries. You can start off with a single Citus server, then add more nodes and rebalance the shards as you grow. Parallelism, storing more data in memory and using higher I/O bandwidth along with columnar compression can speed up queries by 20x or 300x. Citus is a new extension (not fork) of the latest Postgres version, allowing you to use your familiar SQL toolkit and leverage your Postgres expertise. Use a single database to manage both your analytical and transactional workloads. Download and use Citus Open Source for free. Citus can be managed by you, if you embrace open source and use GitHub. Focus on your app & forget your database. Azure Cosmos DB PostgreSQL for Citus allows you to run your app in the cloud. -
32
TrueMoney
TrueMoney
FreeTrueMoney, Thailand's leading mobile financial application, is available to all mobile network users in Thailand (AIS, Dtac and TrueMove H). Our all-in one app allows you to securely make cardless and cashless payments for your everyday needs including mobile top-ups and bill payments, as well as online and offline purchases. Enjoy exclusive discounts and promotions across a variety of services and merchants. With a high-yield savings account that offers cashback on purchases, insurance and investment in different assets, you can simplify your finances to open up more possibilities. We empower businesses of any size and help SME-entrepreneurs grow their business. Pay with confidence, knowing that all of your information is encrypted, secure, and protected. Pay using your wallet balance or a linked credit/debit cards to shop in offline stores or pay bills. You can pay online with confidence, as you are able to control the payment amount. -
33
xCAT
xCAT
FreexCAT is an open-source tool that automates the deployment, scaling and management of virtual machines and bare metal servers. It provides comprehensive management capabilities for high performance computing clusters. This includes render farms, grids and web farms. xCAT is an extensible framework based upon years of system administration experience. It allows administrators to discover hardware servers and execute remote system management. They can also provision operating systems in virtual or physical machines, both in diskless and disk mode, install and configure applications, and perform system management in parallel. The toolkit is compatible with ppc64le architectures, such as x86_64 and ppc64, and supports a variety of operating systems including Red Hat Ubuntu SUSE and CentOS. It integrates management protocols such as IPMI, HMC FSP and OpenBMC to facilitate remote console access. -
34
IBM Datacap
IBM
Streamline the classification, recognition, and capture of business documents. IBM® Datacap software forms a key capability in the IBM Cloud Pak®. This is for Business Automation. It simplifies the classification, recognition, and capture of business documents. It uses text analytics, natural language processing, and machine learning to extract content from unstructured and variable paper documents. Multichannel input from scanners and faxes, emails and digital files, such as PDF and images from mobile devices and applications. Machine learning is used to automate complex or unidentified formats and highly variable documents that are difficult to capture using traditional systems. Allows you to export information and documents to a variety of applications and content repositories, including IBM and other vendors. To speed up deployment, this interface allows you to configure capture workflows and apps with a simple point-and click interface. -
35
Comarch EDI
Comarch
A secure and comprehensive platform for B2B collaboration within a supply chain. The Comarch EDI platform allows data exchange with all business partners. We recommend a solution that is tailored to your company's business needs, in relation to technological advancements and the volume document. We offer a variety of functionalities that will simplify communication with business partners. A GDSN-certified catalog allows for the management of product data that is exchanged with many business partners around the world. It makes it possible to define multiple attributes - both general and specific to a business partner. This functionality ensures coherence and high quality data throughout the entire value-chain. This is the solution to optimizing supply chain processes. It allows for effective communication between logistics operators and ensures fast and secure data flow. -
36
Commvault Cloud
Commvault
Commvault Cloud is an all-in-one cyber resilience platform designed to secure, manage, and recover data across hybrid, multi-cloud, and SaaS environments. Leveraging Metallic AI, it provides intelligent threat detection, automated compliance enforcement, and rapid disaster recovery solutions such as Cleanroom Recovery and Cloudburst Recovery. The platform enhances data security with proactive risk assessments, cyber deception techniques, and real-time threat hunting to prevent breaches. With infrastructure-as-code automation, organizations can ensure seamless data recovery, business continuity, and minimal downtime. Commvault Cloud simplifies data protection through a unified interface, empowering businesses to safeguard critical assets and quickly respond to cyber incidents. -
37
HylaFAX Enterprise
iFAX Solutions
HylaFAX has become one of the most popular fax servers in the world. iFAX Solutions adds features to the platform for enterprise and high volume fax customers. Discover why HylaFAX Enterprise, the preferred fax platform for top-level businesses, is the most stable, stable, and scalable available fax platform. HylaFAX Open Source was created to improve the functionality of the standalone machine and bring efficiencies to the workplace. Commercial enhancements and support were not available for the mission-critical fax platforms and applications. iFAX Solutions, the core developers and sponsors HylaFAX are proud to offer both versions to meet our customers' needs. HylaFAX, which was released to the public in 1991 has been a hugely popular fax server. Today, iFAX Solutions extends this platform by adding features for enterprise and high volume fax customers. -
38
Tenable One
Tenable
Tenable One unifies security visibility and insight across the attack surface. This allows modern organizations to isolate and eliminate priority cyber exposures, from IT infrastructure, cloud environments, critical infrastructure, and everywhere else. The only AI-powered exposure platform in the world. Tenable's leading vulnerability management sensors allow you to see every asset on your entire attack surface, from cloud environments to operational technology, infrastructure to containers and remote workers to web-apps. Tenable's machine learning-powered predictions, which include more than 20 trillion aspects related to threat, vulnerability and misconfiguration information, reduce remediation effort by allowing you to focus on the most important risks. By communicating objective measures of risks, you can drive improvements to reduce the likelihood of a business impacting cyber event occurring. -
39
FlashBlade//S
Pure Storage
Pure FlashBlade//S, the industry's leading all-flash solution for consolidating file and object storage, is the fastest storage solution available. Modernize your storage by implementing a unified, unstructured storage solution that delivers the Modern Data ExperienceTM. Tackle your most challenging modern data requirements. FlashBlade offers cloud-like simplicity, agility and high performance with control. FlashBlade helps you meet the demands of modern applications, and leverage modern data. FlashBlade//S delivers massive parallelism and throughput with consistent multidimensional performance across all data. Add blades to increase capacity and performance. It's a fast file and object store that goes beyond the traditional scale-out NAS. FlashBlade's scale out metadata architecture can handle up to tens or billions of objects and files with maximum performance. Purity//FB supports disaster recovery and cloud mobility through object replication. -
40
Thunder TPS
A10 Networks
Thunder TPS is used by top service providers and online gaming businesses. It provides automated DDoS protection that is scalable and automated. It uses advanced machine learning to detect attacks and mitigate them. Multi-modal source-based defense identifies attackers without causing damage to users. 5-level adaptive mitigation policy, zero day Automated Protection (ZAP), actionable distributed-denial-of-service weapons intelligence at a scale 96M-entry white/black lists Flexible and robust Distributed Denial of Service protection (DDoS), with a wide variety of hardware and software deployment options to meet your specific needs. High-precision, automated DDoS mitigation solution can be delivered as hardware or virtual appliances in speeds ranging from 1 Gbps up to 500 Gbps. High-performance, Sflow-based, IPFIX-based DDoS detection for a complete reactive cyber attack defense system. This appliance can be used as a standalone appliance, or integrated with aGalaxy 5000. -
41
Cloud-delivered DDoS Protection that detects and mitigates threats before they reach your infrastructure. Cloud-delivered DDoS Protection detects and mitigates threats before they reach your organization. F5 Distributed DDoS Mitigation Service, a cloud-delivered managed protection service, detects and mitigates large scale, SSL or application-targeted, attacks in real-time, protecting your business against attacks exceeding hundreds of gigabits/second. The F5 Security Operations Center is at the forefront of protecting your business.
-
42
Portworx
Pure Storage
Kubernetes can be run in production using the #1 Kubernetes platform. It offers persistent storage, backup, data security, capacity management, and DR. You can easily backup, restore, and migrate Kubernetes applications to any cloud or data centre. Portworx Enterprise Storage Platform provides end-to-end storage, data management, and security for all Kubernetes projects. This includes container-based CaaS and DBaaS as well as SaaS and Disaster Recovery. Container-granular storage, disaster recovery and data security will all be available to your apps. Multi-cloud migrations are also possible. You can easily solve enterprise requirements for Kubernetes data service. Your users can easily access a cloud-like DbaaS without losing control. Operational complexity is eliminated by scaling the backend data services that power your SaaS app. With a single command, add DR to any Kubernetes application. All your Kubernetes apps can be easily backed up and restored. -
43
Starburst Enterprise
Starburst Data
Starburst allows you to make better decisions by having quick access to all of your data. Your company has more data than ever, but your data teams are still waiting to analyze it. Starburst gives your data teams quick and accurate access to more data. Starburst Enterprise, a fully supported, production-tested, enterprise-grade distribution for open source Trino (formerly Presto®, SQL), is now available. It increases performance and security, while making it easy for you to deploy, connect, manage, and manage your Trino environment. Starburst allows your team to connect to any source of data, whether it's on-premise, in a cloud, or across a hybrid cloud environment. This allows them to use the analytics tools they already love and access data that lives anywhere. -
44
Strongspace
Strongspace
$5.99 per user per monthStrongspace allows you to take control of your most valuable files and information. Strongspace is ExpanDrive’s latest offering for cloud storage. Strongspace focuses on rysnc which synchronizes files between locations while minimizing data transfer using delta encoding. Secure links via ZFS and rsync, as well as wicp encryption provide high levels of security to system users. Strongspace developers have developed their own API and command line utility using SFTP and other methods. This makes data easier to access, control, and manage. Strongspace creates images from all files and folders. This allows you to easily roll back to daily or week-end snapshots of data. Strongspace offers three basic storage plans that have limited space. You can also choose to purchase custom plans that have up to 15TB of storage. Strongspace offers cloud storage at a custom and scalable price to businesses. -
45
Imperva CDN
Imperva
If you don't have security, the risk of your website and application being deployed around the world can increase. The Imperva Content Delivery Network, (CDN), provides content caching, load-balancing, failover, and failover, all built into a comprehensive Web Application Protection (WAAP), platform. Your applications are securely delivered around the world. Machine learning will do the rest. It efficiently caches your dynamically-generated pages, while ensuring content freshness. This greatly increases cache utilization and further reduces bandwidth consumption. Multiple content and networking optimization techniques can be used to reduce page rendering time and improve the user experience. Imperva's global CDN employs advanced caching and optimization techniques in order to increase connection and response speeds and lower bandwidth costs. -
46
Imperva WAF
Imperva
Web application attacks can prevent sensitive data being stolen and prevent transactions from being made. Imperva Web Application Firewall analyzes traffic to your application to stop these attacks and ensure uninterrupted operations. You must choose whether to block legitimate traffic or manually limit attacks that your WAF allows through. Imperva Research Labs guarantee accuracy for WAF customers when the threat landscape changes. Your security teams can use third-party code with no risk and speedy rule propagation to create policies. Imperva WAF is an integral part of a comprehensive Web Application Protection (WAAP), stack that protects from edge to databank. This ensures that you only receive the traffic you need. We offer the best website protection in industry - PCI compliant, automated security that integrates analysis to go beyond OWASP Top 10 coverage and reduces third-party code. -
47
Imperva DDoS Protection
Imperva
Imperva DDoS Protection protects your assets at the edge to ensure uninterrupted operation. You can ensure business continuity with 100% uptime. DDoS mitigation is based on the following rule: "moments to go down and hours to recover". Every second counts when you defend against an attack. Imperva provides you with the assurance that attack traffic will automatically be blocked at the edge. This is without you having to increase your bandwidth. Imperva DDoS protection for websites is an all-in-one service that instantly mitigates any size or type of DDoS attack on web applications. Our DDoS protection for websites is complemented by the Imperva cloud-based web application firewall (WAF), which stops hacking attempts and attacks from malicious bots. Your DNS records can be modified to ensure that all HTTP/S traffic to your domain(s), is routed through the Imperva network. Imperva DDoS protection protects websites by acting as a secure proxy. It masks your origin server IP. -
48
AT&T Alien Labs Open Threat Exchange
AT&T Cybersecurity
The largest open threat intelligence network in the world that facilitates collaborative defense using actionable, community-powered threats data. The security industry's threat sharing is still ad-hoc and informal. It is fraught with frustrations, blind spots, and pitfalls. Our vision is that companies and government agencies can quickly gather and share information about cyberattacks and threats, as well as current breaches, as accurate, timely, and complete information as quickly as possible. This will allow us to avoid major breaches and minimize the damage caused by an attack. This vision is realized by the Alien Labs Open Threat Exchange (OTX) - which provides an open, transparent threat intelligence community. OTX allows open access to a global network of security professionals and threat researchers. There are now more than 100,000 participants from 140 countries who contribute over 19,000,000 threat indicators each day. It provides community-generated threat information, facilitates collaborative research, and automates the updating of your security infrastructure. -
49
Entrust Identity Enterprise
Entrust
Strong digital security is possible with the world's most trusted on-prem identity and access management (IAM). Identity Enterprise is an integrated IAM platform which supports a wide range of consumer, worker, and citizen use cases. Identity Enterprise is ideal for high-assurance applications that require zero trust for thousands or millions users. It can be deployed on-premises as well as virtual appliances. Never trust, always verify. Your organization and user communities are protected both within and outside the perimeter. High assurance use case coverage includes credential-based access, smart cards issuance and best-in class MFA. This will protect your workforce, consumers, and citizens. User friction can be reduced with adaptive risk-based authentication and passwordless login. You can use digital certificates (PKI), which provide a higher level security, whether you have a physical smartcard or a virtual one. -
50
Entrust Identity Essentials
Entrust
Multi-factor authentication (MFA), which is fast and cost-effective, allows Windows-based companies to achieve Zero Trust. Start with an easy to use, easy-to deploy on-premises MFA system. Then, if necessary, migrate to Identity as a service in the cloud. The seamless integration between the two provides a frictionless experience and three additional authentication options: mobile push, device fingerprint, grid cards. One license, one solution to secure and empower your digital business. Adaptive authentication and self-service password changes reduce friction for users. Different authentication methods can be provided for different users and different requirements. There are many options for authenticators, including SMS, voice, email, and OTP. Option to use smart phone biometrics such as fingerprint and facial match. ActiveSync for Outlook prevents unauthorized devices from accessing users’ email without the need for MDM integration.