What Integrates with Wind River Workbench?
Find out what Wind River Workbench integrations exist in 2025. Learn what software and services currently integrate with Wind River Workbench, and sort them by reviews, cost, features, and more. Below is a list of products that Wind River Workbench currently integrates with:
-
1
VxWorks
Wind River
$18,500 /seat VxWorks®, a leading real-time operating platform in the industry, provides all the performance, reliability, safety and security capabilities you need for the most critical infrastructure's embedded computing systems. VxWorks is a preemptive, deterministic RTOS that prioritizes real-time embedded applications. It has low latency and minimaljitter. VxWorks has many security features that address the evolving security threats connected devices face at every stage, from boot-up to operation to data transfer to powered off. VxWorks has been certified to IEC 61508, ISO 26262, and DO-178C safety standards. VxWorks is built on an extensible, future-proof architecture that allows you to quickly respond to changing market demands, customer needs, technological advancements, and preserves your investment. -
2
LDRA Tool Suite
LDRA
The LDRA tool suite stands as the premier platform offered by LDRA, providing a versatile and adaptable framework for integrating quality into software development from the initial requirements phase all the way through to deployment. This suite encompasses a broad range of functionalities, which include requirements traceability, management of tests, adherence to coding standards, evaluation of code quality, analysis of code coverage, and both data-flow and control-flow assessments, along with unit, integration, and target testing, as well as support for certification and regulatory compliance. The primary components of this suite are offered in multiple configurations to meet various software development demands. Additionally, a wide array of supplementary features is available to customize the solution for any specific project. At the core of the suite, LDRA Testbed paired with TBvision offers a robust combination of static and dynamic analysis capabilities, along with a visualization tool that simplifies the process of understanding and navigating the intricacies of standards compliance, quality metrics, and analyses of code coverage. This comprehensive toolset not only enhances software quality but also streamlines the development process for teams aiming for excellence in their projects. -
3
SOAtest
Parasoft
PARASOFT SOATEST Artificial Intelligence and Machine Learning Power APIs and Web Service Testing Tools Parasoft SOAtest is based on artificial intelligence (AI), machine learning (ML), and simplifies functional testing across APIs and UIs. The API and web service testing tool is perfect for Agile DevOps environments because it uses continuous quality monitoring systems to monitor the quality of change management systems. Parasoft SOAtest is a fully integrated API and web-service testing tool that automates end-to-end functional API test automation. Automated testing is simplified with advanced functional test-creation capabilities. This applies to applications with multiple interfaces (REST and SOAP APIs as well as microservices, databases, etc.). These tools reduce security breaches and performance issues by turning functional testing artifacts in security and load equivalents. This allows for faster and more efficient testing, while also allowing continuous monitoring of API changes. -
4
Seeker
Black Duck
Seeker® is an advanced interactive application security testing (IAST) tool that offers exceptional insights into the security status of your web applications. It detects trends in vulnerabilities relative to compliance benchmarks such as OWASP Top 10, PCI DSS, GDPR, CAPEC, and CWE/SANS Top 25. Moreover, Seeker allows security teams to monitor sensitive information, ensuring it is adequately protected and not inadvertently recorded in logs or databases without the necessary encryption. Its smooth integration with DevOps CI/CD workflows facilitates ongoing application security assessments and validations. Unlike many other IAST tools, Seeker not only uncovers security weaknesses but also confirms their potential for exploitation, equipping developers with a prioritized list of verified issues that need attention. Utilizing its patented techniques, Seeker efficiently processes a vast number of HTTP(S) requests, nearly eliminating false positives and fostering increased productivity while reducing business risks. In essence, Seeker stands out as a comprehensive solution that not only identifies but also mitigates security threats effectively. -
5
wolfSSL
wolfSSL
wolfSSL is an open-source internet security firm known primarily for its wolfSSL embedded SSL Library, targeting developers who integrate security features into their applications and devices. By utilizing a dual licensing approach similar to MySQL, wolfSSL offers its services under both a commercial license for business clients and an open-source license for the broader development community. Additionally, wolfSSL provides support and consulting services to enhance user experience. This library stands out as the leading SSL/TLS security choice for IoT applications, effectively safeguarding devices against the most common threat, the man-in-the-middle (MITM) attack. It is also favored in high-traffic server and cloud environments where cryptographic performance is essential. Furthermore, government entities utilize wolfSSL's embedded SSL due to its compliance with FIPS 140-2 standards. In total, more than 2 billion applications and devices have been secured by wolfSSL products, highlighting the widespread trust in its capabilities. This extensive adoption underscores the library's critical role in ensuring security across diverse sectors. -
6
OcNOS
IP Infusion
OcNOS is a powerful and flexible operating system designed for use across the complete range of Open Compute platforms offered by top network device manufacturers. This design ensures uniform operations, enhances workflow automation, and maintains high availability, all while leading to a notable decrease in operational costs. Drawing inspiration from the well-established ZebOS product line, OcNOS boasts a comprehensive feature set and durability that have been proven in countless customer networks over the years. It includes an industry-standard Command Line Interface (CLI), supports all common Management Information Bases (MIBs), and integrates with standard operational and management tools. Furthermore, the system features a centralized management and provisioning framework that supports transaction-based configurations and device feature modeling. This management layer is equipped with capabilities for Netconf and REST APIs, in addition to the ability to generate custom CLI commands. As a result, network administrators can easily configure, oversee, and manage an OcNOS system through a dedicated Network Management System, ensuring optimal performance and efficiency. In essence, OcNOS represents a significant advancement in network operating systems, combining innovation with reliability. -
7
CyberFlood
Spirent
CyberFlood serves as a robust and user-friendly testing solution that simulates realistic application traffic, designed to evaluate the performance, scalability, and security of your app-aware networking devices and solutions. This tool simplifies the process of testing and enforcing application traffic policies, benchmarking performance and capacity, and assessing network security effectiveness while adhering to NetSecOPEN methodologies. Renowned as the premier L4-7 testing solution globally, CyberFlood stands out due to its combination of extreme scale, high performance, and ease of use, which enhances productivity and generates hyper-realistic application traffic. Users can swiftly and effortlessly test with the latest applications available in the market. Moreover, CyberFlood integrates multiple testing functions into a fully virtual testing environment, providing a high-performance appliance capable of app security assessments across 10G, 25G, 40G, 50G, and 100G interfaces within a compact 1U form factor. This solution is essential for evaluating the performance of content-aware networks, security systems, and web applications, enabling organizations to optimize their network infrastructure effectively. With its innovative approach, CyberFlood can revolutionize how businesses manage and assess their network capabilities.
- Previous
- You're on page 1
- Next