What Integrates with wolfSSL?
Find out what wolfSSL integrations exist in 2025. Learn what software and services currently integrate with wolfSSL, and sort them by reviews, cost, features, and more. Below is a list of products that wolfSSL currently integrates with:
-
1
Microsoft Azure
Microsoft
21 RatingsMicrosoft Azure serves as a versatile cloud computing platform that facilitates swift and secure development, testing, and management of applications. With Azure, you can innovate purposefully, transforming your concepts into actionable solutions through access to over 100 services that enable you to build, deploy, and manage applications in various environments—be it in the cloud, on-premises, or at the edge—utilizing your preferred tools and frameworks. The continuous advancements from Microsoft empower your current development needs while also aligning with your future product aspirations. Committed to open-source principles and accommodating all programming languages and frameworks, Azure allows you the freedom to build in your desired manner and deploy wherever it suits you best. Whether you're operating on-premises, in the cloud, or at the edge, Azure is ready to adapt to your current setup. Additionally, it offers services tailored for hybrid cloud environments, enabling seamless integration and management. Security is a foundational aspect, reinforced by a team of experts and proactive compliance measures that are trusted by enterprises, governments, and startups alike. Ultimately, Azure represents a reliable cloud solution, backed by impressive performance metrics that validate its trustworthiness. This platform not only meets your needs today but also equips you for the evolving challenges of tomorrow. -
2
MySQL stands out as the most widely used open source database globally. Thanks to its established track record in performance, dependability, and user-friendliness, it has emerged as the preferred database for web applications, powering notable platforms such as Facebook, Twitter, and YouTube, alongside the top five websites. Furthermore, MySQL is also highly favored as an embedded database solution, being distributed by numerous independent software vendors and original equipment manufacturers. Its versatility and robust features contribute to its widespread adoption across various industries.
-
3
Over 15,000 businesses worldwide trust Access Server from OpenVPN for a self-hosted VPN to securely extend their private network to their remote workforce over the internet. That means your remote and hybrid workforce will have access to their business resources with top network security, without adding hundreds of hours of setup and maintenance time to your to-do list. OpenVPN Access Server is a full-featured SSL self-hosted VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications with fine-grained access control.
-
4
iwave
Kindsight
Enhance your fundraising efforts with our user-friendly interface, contemporary aesthetics, and cutting-edge architecture. iWave stands out as the top choice for donor research among experts in the field. But what makes it so valuable? It offers a thorough collection of trustworthy wealth, charitable, and personal details on potential donors, ensuring that you approach the right individuals for the appropriate amounts at the ideal moments. Our wealth-screening feature allows you to identify potential donors who have both the means and the willingness to make significant contributions. By compiling data on wealth, philanthropy, and personal backgrounds, we create detailed prospect profiles tailored to your organization’s needs. This way, you can confidently make your fundraising requests without leaving your donor management system, as all the vital insights are conveniently available within our platform. With iWave, you can elevate your fundraising strategy and maximize your organization’s potential for success. -
5
NGINX
F5
NGINX Open Source is the web server that supports over 400 million websites globally. Built upon this foundation, NGINX Plus serves as a comprehensive software load balancer, web server, and content caching solution. By opting for NGINX Plus instead of traditional hardware load balancers, organizations can unlock innovative possibilities without being limited by their infrastructure, achieving cost savings of over 80% while maintaining high performance and functionality. It can be deployed in a variety of environments, including public and private clouds, bare metal, virtual machines, and container setups. Additionally, the integrated NGINX Plus API simplifies the execution of routine tasks, enhancing operational efficiency. For today's NetOps and DevOps teams, there is a pressing need for a self-service, API-driven platform that seamlessly integrates with CI/CD workflows, facilitating faster app deployments regardless of whether the application utilizes a hybrid or microservices architecture, which ultimately streamlines the management of the application lifecycle. In a rapidly evolving technological landscape, NGINX Plus stands out as a vital tool for maximizing agility and optimizing resource utilization. -
6
HAProxy Enterprise
HAProxy Technologies
HAProxy Enterprise, the industry's most trusted software load balancer, is HAProxy Enterprise. It powers modern application delivery at all scales and in any environment. It provides the highest performance, observability, and security. Load balance can be determined by round robin or least connections, URI, IP addresses, and other hashing methods. Advanced decisions can be made based on any TCP/IP information, or HTTP attribute. Full logical operator support is available. Send requests to specific application groups based on URL, file extension, client IP, client address, health status of backends and number of active connections. Lua scripts can be used to extend and customize HAProxy. TCP/IP information and any property of the HTTP request (cookies headers, URIs, etc.) can be used to maintain users' sessions. -
7
Polaris Software Integrity Platform
Black Duck
The Polaris Software Integrity Platform™ combines the capabilities of Black Duck Integrity products and services into a cohesive, user-friendly solution designed to empower security and development teams to create secure, high-quality software more efficiently. Its elastic capacity and concurrent scanning capabilities significantly enhance the speed of application scans. Additionally, Polaris is capable of scaling to accommodate thousands of applications effortlessly. With this platform, you won't need to worry about deploying hardware or updating software, and there are no restrictions on team size or the frequency of scans. You can quickly onboard and begin scanning code within minutes, while also automating testing through seamless integrations with SCM, CI, and issue-tracking systems. Polaris unifies our top-tier security analysis engines on a single platform, offering the versatility to conduct various tests at different intervals according to the specific application, project needs, timeline, or SDLC events. This ensures that security measures are consistently integrated throughout the development process. -
8
Mongoose Harmony
Mongoose
Harmony is a smart chatbot solution that seamlessly directs website visitors to relevant content, collects lead information, and connects discussions to the right team members. This service is enhanced by our collaboration with Drift in higher education. Always available and ready to assist, Harmony ensures that your website effectively represents your institution. Mongoose’s Harmony solution provides your site with a voice that operates around the clock. Staff members can engage in live chats when possible, or the bot can handle inquiries to help visitors find the information they need. Additionally, you have the option to personalize the branding to reflect your school's identity. It efficiently connects visitors to the right department or individual through targeted questions. Multiple team members can participate in a chat, and notification alerts keep track of visitor inquiries. Furthermore, when it’s time to transition to a more personal interaction, visitors can easily schedule meetings with staff directly through the bot, making the entire process feel seamless and intuitive. This capability not only enhances visitor experience but also streamlines communication within your institution. -
9
Keyfactor Command for IoT
Keyfactor
Keyfactor Command for IoT is an end-to-end identity management solution that ensures the security and compliance of connected devices. By automating the process of provisioning, managing, and revoking device certificates, the platform helps businesses secure IoT devices throughout their entire lifecycle. With support for over-the-air provisioning and real-time visibility into device identity statuses, businesses can easily track and monitor their IoT deployments. Whether for automotive, medical devices, or industrial IoT, Keyfactor Command for IoT provides the tools needed to maintain a trusted, scalable IoT infrastructure. It integrates seamlessly with major IoT platforms, enhancing security with features like automated certificate renewal, revocation, and crypto-agility. This ensures that IoT systems remain secure, adaptable, and compliant with industry standards. -
10
MPLAB Harmony v3
Microchip
MPLAB® Harmony v3 is a comprehensive framework designed for embedded software development, offering a range of flexible and interoperable software modules that aim to streamline the creation of enhanced features while expediting product launches. This framework is core-agnostic, providing support for both MIPS® and Arm® Cortex® core architectures, thereby ensuring code portability through consistent APIs applicable across various device families. The MPLAB Harmony Configurator’s (MHC’s) Graphical User Interface (GUI) allows for straightforward configuration, making it user-friendly. It has been validated for compatibility with 32-bit PIC® (MIPS-based) and SAM (Arm Cortex-based) MCU and MPU device families, ensuring robust performance. Additionally, it seamlessly integrates with third-party solutions such as FreeRTOS and Micrium®, and it can import projects developed in IAR Embedded Workbench. The latest version introduces support for SAM families of Arm Cortex-M based devices, complemented by a free software development environment. Furthermore, the graphical configuration features offered by MHC’s GUI facilitate easy setup of devices and libraries, enhancing the overall development experience. This combination of features makes MPLAB Harmony v3 a powerful tool for developers aiming to maximize efficiency and minimize time-to-market for their products. -
11
OrangeCRM
OrangeCRM
$499 per monthRecognizing that every business operates with its own distinct processes, objectives, and demands, OrangeCRM delivers the adaptability required through a wide-ranging assortment of modules tailored for a personalized Relationship Management system. Each module acts as an additional element that integrates effortlessly with your OrangeCRM database, enhancing functionality and tools in alignment with your unique business needs. Our extensive array of modules caters to all types of businesses—whether you are a fledgling startup or a large enterprise with complex requirements—ensuring that OrangeCRM is sufficiently versatile to function as a comprehensive solution for organizations of any scale. Among these, the Analytics module stands out by providing essential business intelligence, robust analytics, and real-time reporting capabilities that allow for thorough data interpretation and analysis. Furthermore, our web-based platform empowers authorized users within your organization to swiftly access and track vital metrics, facilitating timely and informed decision-making. This level of accessibility and customization ensures that you can adapt your approach as your business evolves. -
12
CA Datacom
Broadcom
Ensure your business applications are continuously accessible by leveraging a dependable database system designed for enterprise-level, high-volume workloads with exceptional fault tolerance. The CA Datacom® suite, along with its various rDBMS offerings, serves as the robust repository you need. This resilient database system takes advantage of zIIP specialty processor technology, resulting in enhanced and economically efficient database management. It facilitates seamless integration with mobile-to-mainframe initiatives, cloud services, web applications, and big data analytics through JDBC and ODBC interfaces. Effectively handle high-volume workloads, while each new version incorporates advanced hardware technologies and refined memory optimization strategies. Database Administrators and Systems Programmers can easily monitor and manage their environment by querying the Dynamic System Tables within a Multi-User Facility region on a specific LPAR, utilizing contemporary tools. Furthermore, modern developers who may be new to the mainframe environment can efficiently manage their source code using popular modern IDEs like Visual Studio Code or Eclipse CHE, bridging the gap between traditional and contemporary development practices. This capability not only enhances productivity but also fosters innovation within the organization. -
13
Wind River Workbench
Wind River Systems
Wind River Workbench provides a complete set of tools for developers who use Wind River platforms. It includes everything you need to configure and tune your operating system, as well as debugging an entire system. Workbench's visual Kernel Configurator for Wind River Linux or VxWorks® allows you to customize your operating system image. Workbench's dynamic analysis tools allow you to dive deep into your platform's code, third-party libraries and operating system. Workbench uses a target-agent connection to provide a debugging solution that can handle the most complex systems in your development lifecycle. -
14
PikeOS
SYSGO
PikeOS is a separation kernel-based hypervisor that supports multiple partitions for many operating systems and applications. It allows you to create smart devices for the Internet-of-Things. PikeOS is the best choice for systems that require protection against Cyber-Security attack due to its separation kernel approach. It is widely used in millions of edge and IoT systems. However, it has also been deployed in critical communications infrastructures. PikeOS combines virtualization and real time with unique technologies that have never been seen before. It allows you to move multiple complex embedded circuit boards into one hardware. It is also able to handle new hardware concepts like Big-SoCs that have multiple heterogeneous cores. PikeOS can run on multiple architectures and support processors that have a memory management unit (MMU). -
15
Keyfactor Command
Keyfactor
Become part of the foremost businesses utilizing the most comprehensive and scalable managed PKI as-a-Service. Experience the benefits of PKI without the associated complications. Whether your focus is on protecting your network, safeguarding sensitive information, or ensuring the security of connected devices, PKI serves as the reliable solution for establishing trust. However, developing and maintaining your own PKI can be intricate and costly. Achieving success in this area is essential, though it presents numerous challenges. Locating and keeping skilled professionals, complying with industry regulations, and managing the financial burden of the necessary hardware and software for a solid PKI infrastructure are significant hurdles, particularly when considering the risks involved if something fails. Streamline your inventory management and set up proactive alerts to inform users about upcoming expirations or compliance issues with certificates before they escalate into major problems. Additionally, leveraging managed PKI services allows you to focus on your core business objectives while reducing the operational burden associated with securing your digital assets.
- Previous
- You're on page 1
- Next