Business Software for Azure Resource Manager

Top Software that integrates with Azure Resource Manager as of July 2025

Compare business software, products, and services to find the best solution for your business or organization. Use the filters on the left to drill down by category, pricing, features, organization size, organization type, region, user reviews, integrations, and more. View and sort the products and solutions that match your needs in the results below.

  • 1
    Cortex

    Cortex

    Cortex

    Cortex's internal developer portal (IDP) helps engineering teams drive adoption of best practices, improve visibility into services and infrastructure, and accelerate engineering productivity. With Cortex, engineering organizations can codify standards, manage service maturity, and reduce operational overhead, empowering developers to ship faster and more reliably. Trusted by high-performing engineering organizations, Cortex integrates seamlessly with existing tools to provide a centralized, actionable view of service health and ownership. • Within minutes, determine who owns each service with Cortex’s AI service ownership model across thousands of repositories. • Standardize golden paths using Workflows, enabling teams to scaffold new services & provision infrastructure in minutes. • Consistently uphold best practices and standards across your organization with automated Scorecards and targeted Initiatives. • Make informed, impactful actions based on real-time insights.
    Starting Price: Custom
    View Software
    Visit Website
  • 2
    Netdata

    Netdata

    Netdata, Inc.

    The open-source observability platform everyone needs! Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: 💥 Collects metrics from 800+ integrations 💪 Real-Time, Low-Latency, High-Resolution 😶‍🌫️ Unsupervised Anomaly Detection 🔥 Powerful Visualization 🔔 Out of box Alerts 📖 systemd Journal Logs Explorer 😎 Low Maintenance ⭐ Open and Extensible Try Netdata today and feel the pulse of your infrastructure, with high-resolution metrics, journal logs and real-time visualizations.
    Leader badge
    Starting Price: Free
  • 3
    Azure Analysis Services
    Use Azure Resource Manager to create and deploy an Azure Analysis Services instance within seconds, and use backup restore to quickly move your existing models to Azure Analysis Services and take advantage of the scale, flexibility and management benefits of the cloud. Scale up, scale down, or pause the service and pay only for what you use. Combine data from multiple sources into a single, trusted BI semantic model that’s easy to understand and use. Enable self-service and data discovery for business users by simplifying the view of data and its underlying structure. Reduce time-to-insights on large and complex datasets. Fast response times mean your BI solution can meet the needs of your business users and keep pace with your business. Connect to real-time operational data using DirectQuery and closely watch the pulse of your business. Visualize your data using your favorite data visualization tool.
    Starting Price: $0.81 per hour
  • 4
    PowerShell

    PowerShell

    Microsoft

    PowerShell is a cross-platform task automation and configuration management framework, consisting of a command-line shell and scripting language. Unlike most shells, which accept and return text, PowerShell is built on top of the .NET Common Language Runtime (CLR), and accepts and returns .NET objects. This fundamental change brings entirely new tools and methods for automation. Unlike traditional command-line interfaces, PowerShell cmdlets are designed to deal with objects. An object is structured information that is more than just the string of characters appearing on the screen. Command output always carries extra information that you can use if you need it. If you've used text-processing tools to process data in the past, you'll find that they behave differently when used in PowerShell. In most cases, you don't need text-processing tools to extract specific information. You directly access portions of the data using standard PowerShell object syntax.
  • 5
    Kaholo

    Kaholo

    Kaholo

    Scriptless CI/CD Automation for On-Demand Developer Portals Kaholo is a low-code IT workflow automation tool that empowers Developers to quickly self-serve environments and automate their workflows while giving Operators full visibility and control over compliance, security, and cloud costs. Key Capabilities: - Drag and drop low-code CI/CD pipelines - 150+ pre-built plugins that interact with external resources that anyone can use without proprietary knowledge, or custom-build your own - Orchestrate your existing CI/CD toolset to avoid the inefficient route of rip and replace - Extensive access permissions allow developers to safely work with and execute pipelines autonomously - Automate provisioning, testing, security scans, builds, deployments with various rollout strategies, rollbacks, cleanups, updates, troubleshooting, remediations, migrations, and more. - Integrations with all cloud providers as well on-prem environments
    Starting Price: $99 per month
  • 6
    Codacy

    Codacy

    Codacy

    Codacy is an automated code review tool that helps identify issues through static code analysis, allowing engineering teams to save time in code reviews and tackle technical debt. Codacy integrates seamlessly into existing workflows on your Git provider, and also with Slack, JIRA, or using Webhooks. Users receive notifications on security issues, code coverage, code duplication, and code complexity in every commit and pull request along with advanced code metrics on the health of a project and team performance. The Codacy CLI enables running Codacy code analysis locally, so teams can see Codacy results without having to check their Git provider or the Codacy app. Codacy supports more than 30 coding languages and is available in free open-source, and enterprise versions (cloud and self-hosted). For more see https://www.codacy.com/
    Starting Price: $15.00/month/user
  • 7
    BlocTrust

    BlocTrust

    BlocWatch

    BlocTrust provides independent, third-party verification, and assurance along with continuous awareness of the health of your blockchain for private blockchains and DLTs. BlocTrust runs as an endorsement node within a private blockchain network: verifying and endorsing blockchain transactions, providing assurance to all blockchain participants, and demonstrating the accuracy and legitimacy of endorsed transactions. BlocTrust maintains an independent, validated ledger of blockchain transactions. This authoritative record proves vital for following compliance mandates and meeting audit requirements. Designed to be both comprehensive and impartial, you can turn to BlocTrust for addressing disputes among Blockchain participants. BlocTrust generates monthly attestations that summarize the health and activity of the blockchain and display the blockchain operation metrics.
    Starting Price: $2,500 per month
  • 8
    ThreatModeler

    ThreatModeler

    ThreatModeler

    ThreatModeler™ enterprise threat modeling platform is an automated solution that simplifies efforts associated with developing secure applications. We fill a critical and growing need among today's information security professionals: to build threat models of their organizations'​ data, software, hardware, and infrastructure at the scale of the IT ecosystem and at the speed of innovation. ThreatModeler™ empowers enterprise IT organizations to map their unique secure requirements and policies directly into their enterprise cyber ecosystem – providing real-time situational awareness about their threat portfolio and risk conditions. CISOs and other InfoSec executives gain a comprehensive understanding of their entire attack surface, defense-in-depth strategy, and compensating controls, so they can strategically allocate resources and scale their output.
  • 9
    Cortex Cloud

    Cortex Cloud

    Palo Alto Networks

    Cortex Cloud from Palo Alto Networks is a cutting-edge platform designed to provide real-time cloud security across the entire software delivery lifecycle. By combining Cloud Detection and Response (CDR) with advanced Cloud Native Application Protection Platform (CNAPP), Cortex Cloud offers unified visibility and proactive security for code, cloud, and SOC environments. It enables teams to prevent and respond to threats quickly with AI-driven risk prioritization, runtime protection, and automated remediation. With seamless integration across multicloud environments, Cortex Cloud ensures scalable and efficient protection for modern cloud-native applications.
  • 10
    BloodHound Enterprise

    BloodHound Enterprise

    BloodHound Enterprise

    The problem of attack path management requires a fundamentally different, unique methodology designed to help organizations understand, empirically quantify the impact, and eliminate identity-based attack path risks. Enterprise networks, user privileges, application permissions, and security group memberships are dynamic. Consider that in every system a privileged user logs into they leave behind tokens and credentials for adversaries to obtain. Because the connections and behaviors that form attack paths are continuously changing, the attack paths themselves must also be continuously mapped. The haphazard elimination efforts of AD misconfigurations provide zero security posture improvement and negatively impact team productivity. However, if you can empirically identify the specific misconfigurations that allow you to eliminate the largest number of attack paths you can generate meaningful security posture improvement and increase your team’s productivity.
  • 11
    Offensive 360

    Offensive 360

    Offensive 360

    We’ve spent years researching and developing an all-in-one product that is affordable for any organization, offering the best quality ever seen in the SAST industry. We’ve spent years in research to create an all-in-one product that is affordable to any organization with the best quality ever in the industry. O’360 conducts an in-depth source code examination, identifying flaws in the open-source components used in your project. In addition, it offers malware analysis, licensing analysis, and IaC, all enabled by our “brain” technology. Offensive 360 is developed by cybersecurity researchers, not by investors. It is unlimited, as we don’t charge you based on lines of code, projects, or users. Moreover, O360 identifies vulnerabilities that most SAST tools in the market would never find.
  • 12
    DROPS

    DROPS

    DROPS

    DROPS is a release management tool designed to simplify, secure, and centralize the deployment of applications across data centers, hybrid, and multi-cloud infrastructures. It supports a wide range of platforms, integrates seamlessly with various CI/CD pipelines, and offers both agent-based and agentless operations. With features like full-stack release management, automated infrastructure provisioning, and 24/7 availability, DROPS aims to streamline deployment processes and ensure consistent, reliable delivery. The tool is flexible enough to manage both legacy and modern applications, catering to diverse enterprise needs. Select agent-based or agentless operation. No need for agent installation and management. DROPS adapts to your configuration and if agents are needed, they are provisioned automatically. Plan and organize your application deployment from the web console with no scripting needed. Ease collaboration between stakeholders and technical teams.
  • Previous
  • You're on page 1
  • Next