Business Software for HP-UX

Top Software that integrates with HP-UX as of November 2024

HP-UX Clear Filters

Compare business software, products, and services to find the best solution for your business or organization. Use the filters on the left to drill down by category, pricing, features, organization size, organization type, region, user reviews, integrations, and more. View and sort the products and solutions that match your needs in the results below.

  • 1
    Pandora FMS

    Pandora FMS

    Pandora FMS

    With more than 50,000 customer installations across the five continents, Pandora FMS is a truly all-in-one monitoring solution, covering all traditional silos for specific monitoring: servers, networks, applications, logs, synthetic/transactional, remote control, inventory, etc. Pandora FMS gives you the agility to find and solve problems quickly, scaling them so they can be derived from any source, on-premise, multi cloud or both of them mixed. Now you have that capability across your entire IT stack and analytics to find any problem, even the ones that are hard to find. Thanks to more than 500 plugins available, you can control and manage any application and technology, from SAP, Oracle, Lotus, Citrix or Jboss to VMware, AWS, SQL Server, Redhat, Websphere, etc.
    Leader badge
    Starting Price: €18/month
  • 2
    Veeam Kasten
    Backup and restore your applications to protect your data. Meet regulatory and corporate mandates for your business. Move between clouds and on-premises for load balancing and upgrades. Purpose-built for Kubernetes, Veeam Kasten provides enterprise operations teams an easy-to-use, scalable, and secure system for backup/restore, disaster recovery, and mobility of Kubernetes applications. Automatically and seamlessly discovers complex Kubernetes applications and all related dependencies. Dynamic policies ensure complete protection for rapidly evolving applications. With simplicity at its forefront, an extremely easy-to-use dashboard, Kubernetes-native and REST APIs, and CLI support, managing stateful applications becomes effortless. Seamless integration into your environment due to deep integration with Kubernetes distributions, databases, cloud infrastructure, storage, CSI, authentication (OIDC, OAuth, etc.), monitoring, logging, and auditing.
  • 3
    IRI FieldShield

    IRI FieldShield

    IRI, The CoSort Company

    IRI FieldShield® is powerful and affordable data discovery and masking software for PII in structured and semi-structured sources, big and small. Use FieldShield utilities in Eclipse to profile, search and mask data at rest (static data masking), and the FieldShield SDK to mask (or unmask) data in motion (dynamic data masking). Classify PII centrally, find it globally, and mask it consistently. Preserve realism and referential integrity via encryption, pseudonymization, redaction, and other rules for production and test environments. Delete, deliver, or anonymize data subject to DPA, FERPA, GDPR, GLBA, HIPAA, PCI, POPI, SOX, etc. Verify compliance via human- and machine-readable search reports, job audit logs, and re-identification risk scores. Optionally mask data as you map it. Apply FieldShield functions in IRI Voracity ETL, federation, migration, replication, subsetting, or analytic jobs. Or, run FieldShield from Actifio, Commvault or Windocks to mask DB clones.
    Starting Price: Varies by component/scope
  • 4
    IRI CoSort

    IRI CoSort

    IRI, The CoSort Company

    What is CoSort? IRI CoSort® is a fast, affordable, and easy-to-use sort/merge/report utility, and a full-featured data transformation and preparation package. The world's first sort product off the mainframe, CoSort continues to deliver maximum price-performance and functional versatility for the manipulation and blending of big data sources. CoSort also powers the IRI Voracity data management platform and many third-party tools. What does CoSort do? CoSort runs multi-threaded sort/merge jobs AND many other high-volume (big data) manipulations separately, or in combination. It can also cleanse, mask, convert, and report at the same time. Self-documenting 4GL scripts supported in Eclipse™ help you speed or leave legacy: sort, ETL and BI tools; COBOL and SQL programs, plus Hadoop, Perl, Python, and other batch jobs. Use CoSort to sort, join, aggregate, and load 2-20X faster than data wrangling and BI tools, 10x faster than SQL transforms, and 6x faster than most ETL tools.
    Starting Price: From $4K USD perpetual use
  • 5
    IRI DMaaS

    IRI DMaaS

    IRI, The CoSort Company

    Data may be the most important asset, and risk, that your company holds. It describes customers, products, transaction histories, and everything else that you use and plan in business. This data can be in databases, files, spreadsheets, Hadoop, cloud platforms or apps. If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. To facilitate the service, you can transfer unprotected data to a secure on-premise or cloud-based staging area, or provide remote, supervised access to IRI to the data sources(s) at issue under a strict NDA.
    Starting Price: $1000 per day
  • 6
    Data443 Global Privacy Manager
    We make it possible for retailers to champion their customers’ privacy rights while maintaining conversion and simplifying SAR processing. Make your privacy settings the new standard for user experience and customer service. Give your customers clear access to easy-to-understand settings. Give customers a one-stop location for all their privacy needs. Provide clear, accurate explanations of the data you collect and how it is used. Earn increased trust in return. All-or-nothing consent doesn’t benefit you or your customers. Allowing customers to opt-in or out of specific data collection gives them more control and improves your conversion rates. Provide an easy-to-understand report that allows customers to see what data you’ve collected, how it’s being used, and that it’s being protected properly. Enhance your customers’ privacy experience with rapid responses to Subject Access Requests (SARs) while simplifying processing for your team.
    Starting Price: $225 per month
  • 7
    IRI CellShield
    IRI CellShield® protects the sensitive information in your Microsoft Excel® spreadsheets, allowing you to comply with data privacy laws. Point-and-click to protect your columns with reversible and non-reversible masking functions. CellShield keeps your data secure, whether it's in one sheet or a million. Use multiple search methods to find and report on PII across the LAN, and protect it all at once. Classify and mask it in intuitive graphical dialogs. CellShield's core technology is built on the award-winning IRI FieldShield data masking product for databases and flat files. Data masked in one platform can be revealed in another. CellShield EE is the only full-featured, professional data discovery, masking, and auditing package for Excel 2010, 2013, 2016, and 2019 (plus Office 365) workbooks in your LAN. CellShield EE exceeds the security and scope of a single password by combining and automating all these extra capabilities.
    Starting Price: $35 one-time payment
  • 8
    WatchTower Security Management App
    Monitor your network with Check Point’s WatchTower Security Management app and quickly mitigate security threats on the go with your mobile phone. The intuitive WatchTower Security Management App provides real-time monitoring of network events, alerts you when your network is at risk, enables you to quickly block security threats, and configure the security policy for multiple gateways. View the devices connected to your network and any potential security threats. Real-time notification of malicious attacks or unauthorized device connections. Quickly block malware-infected devices and view infection details for further investigation. Customize notifications for your top-priority security events. View all security events by category and drill down for further information. Configure the security settings for multiple gateways. Manage advanced security policy settings securely via web user interface.
  • 9
    Multi-Domain Security Management
    Multi-Domain Security Management delivers more security and control by segmenting security management into multiple virtual domains. Businesses of all sizes can easily create virtual domains based on geography, business unit or security function to strengthen security and simplify management. Enable granular and isolated role-based administration of a multi-tenant security management architecture. Single security management configuration for VPN, Firewall, IPS, and other protections. Create, view and control all network security management domains from a single console. Create and centrally manage multiple administrators in the multi-domain security management environments. Give administrators permission to manage specific domains or different aspects of the multi-domain system. Allow multiple administrators to work on different security management domains simultaneously.
  • 10
    Oracle Data Guard
    Oracle Data Guard ensures high availability, data protection, and disaster recovery for enterprise data. Oracle Data Guard provides a comprehensive set of services that create, maintain, manage, and monitor one or more standby databases to enable production Oracle databases to survive disasters and data corruptions. Data Guard provides the management, monitoring, and automation software to create and maintain one or more synchronized copies of a production database to protect Oracle data from failures, disasters, human error, and data corruptions while providing high availability for mission critical applications. Data Guard is included with Oracle Database Enterprise Edition. Active Data Guard is licensed option to the Oracle Database Enterprise Edition and enables advanced capabilities that extend the basic Data Guard functionality.
    Starting Price: $46 per user per year
  • 11
    SUSE Linux Enterprise Real Time
    Whether it’s an IoT sensor monitoring industrial devices or an edge system that must act instantly on external inputs, SUSE Linux Enterprise Real Time is a real time operating system designed to reduce latency and increase the predictability and reliability of time-sensitive, business-critical applications. Banks, manufacturers, government agencies and others rely on time-dependent applications which must execute accurately and predictably all the time, every time. To act as a single unit, distributed systems need time accuracy not only within a server but across all servers. The Precision Time Protocol (PTP) synchronizes servers via the high-speed network, up to sub-microsecond accuracy. Includes support for device interrupt threads, enabling tuning at the device level, and hardware latency detectors to ensure predictability of application behavior. SUSE Linux Enterprise Real Time gives you the time advantage you need to beat the competition.
    Starting Price: $2,199 per year
  • 12
    Ecosteer

    Ecosteer

    Ecosteer

    Ecosteer’s expertise in data ownership allows companies to turn data and privacy compliance into growth opportunities. By applying an entirely new, decentralized approach to consent management, Ecosteer patented encryption schemes allow data owners to directly control who can access their information, automating compliance with privacy laws Separating access control from visibility control, Ecosteer technologies enables neutral data intermediaries, free from cost and legal liabilities related to traditional centralized consent management. Businesses can securely share data across systems and stakeholders without the complexities of traditional centralized frameworks. Offered as a software license, Ecosteer’s scalable technologies are adaptable to any data source or use case. Our systems maintain seamless functionality as data exchanges grow, ensuring long-term reliability.
  • 13
    Hydro66

    Hydro66

    Hydro66

    For a simple, scalable high quality data center, discover more about secure colocation services in Sweden from Hydro66. Connect your servers at blazing fast internet speeds, deploy a private cloud or hybrid cloud architecture or create a secure backup or disaster recovery site. Start from a single rack or grow further and faster with true scalable space and power. Do you expect more than just rack space from your colocation hosting partner? We will help you install your kit, deliver connectivity solution options and provide class-leading security to make sure your applications stay online all the time. When you need a colocation cage for an additional layer of privacy we will custom design and build the space and power density you need. Mesh steel built from solid floor to ceiling gives your applications the ultimate physical security. For maximum flexibility and time to market for colocation build to spec projects, we can provide a range of resilience, size and density options.
  • 14
    StorMagic SvKMS
    We believe enterprises deserve a one-stop approach to key management. SvKMS provides a single platform that manages all your encryption keys, anywhere. Customers get an enterprise key manager for any encryption workflow, whether at the edge, data center, cloud or even multi-cloud. SvKMS has enterprise-grade features delivered in a simple to use interface, all at a surprisingly low cost. Deploy anywhere, high availability without boundaries, integrate with any workflow. Advanced key management, powerful reporting & authorization, lowest price for massive scale. Centralized management, easy configuration, effortless administration. Unify all encryption key management processes in a centralized virtual appliance. Providing widely accessible risk reduction via GUI, integrated REST API-enhanced workflows and KMIP standardization help SvKMS deliver rapid customization, logging, dashboard auditing and monitoring for all deployment scenarios.
  • 15
    Aruba ESP

    Aruba ESP

    Aruba Networks

    Aruba ESP (Edge Services Platform) is a next-generation, cloud-native architecture that enables you to accelerate digital business transformation through automated network management, Edge-to-cloud security, and predictive AI-powered insights with up to 95% accuracy. Only ESP delivers faster everything, time to remediation, speed of security protection, scaling of users and locations, and operational AIOps on a single, cloud-native architecture. Dynamic segmentation and policy enforcement rules to secure new devices. Cloud-managed orchestration across wired, wireless, and WAN. Ultimate flexibility, in the cloud, on-premises, or consumed as a service. Gain context, visibility, and control over all domains through a cloud-native, uniform console for Wi-Fi, wired, and WAN infrastructure. Aruba’s Unified Infrastructure simplifies and improves IT operations across campus, branch, remote, data center, and IoT networks, all managed and orchestrated in the cloud or on-prem.
  • 16
    BugZero

    BugZero

    BugZero

    BugZero decreases risk and increases IT operational intelligence by integrating your ITSM tool to collect, filter, correlate, and track non-security bugs specific to your vendor products. Vendor operational bugs are an ongoing problem for every IT organization. These bugs, embedded in virtually every critical system, threaten business productivity and profitability. Precisely maps all applicable software and firmware bugs to each device or system in your organization. Eliminates the “noise” of less important bugs by selecting the bug severity levels that will trigger tickets in your ITSM tool. Delivers visibility into the presence, criticality, and risks of vendor bugs residing in the infrastructure. Ensures accurate and up-to-date operational bug data by taking action on bugs as soon as they are published by vendors. The solution is up, running, and reporting on vendor operational bug data within hours.
  • 17
    Network Critical

    Network Critical

    Network Critical

    Network Critical’s scalable and persistent visibility layer optimizes network infrastructure without compromising operations or security. Our solutions and systems are used globally across sectors. Network Critical's visibility layer feeds tools and systems data that are required to monitor and control your network. Network Critical’s scalable and persistent visibility layer feeds tools and systems the crucial network data needed to optimize, monitor, and control changing network infrastructure without compromising operations or security. Network TAPs are the base layer of smart network access and are able to monitor events on a local network. This means complete network visibility is maintained across all network security and monitoring platforms. Provides excellent performance and flexibility, needed to manage tools that are protecting network infrastructure, securing information, and keep up with the ever-changing attack environment.
  • 18
    WEKA

    WEKA

    WEKA

    WEKA 4 delivers next-level performance while running impossible workloads anywhere, without compromise. Artificial Intelligence is creating new business opportunities. Operationalizing AI requires the ability to process massive amounts of data from different sources in a short time. WEKA offers a complete solution engineered to accelerate DataOps challenges across the entire data pipeline whether running across on-prem and the public cloud. Storing and analyzing large data sets in life sciences whether it is next-generation sequencing, imaging, or microscopy requires a modern approach for faster insights and better economics. WEKA accelerates time to insights by eliminating the performance bottlenecks across the Life Sciences data pipeline, while significantly reducing the cost and complexity of managing data at scale. WEKA offers a modern storage architecture that can handle the most demanding I/O-intensive workloads and latency-sensitive applications at an exabyte scale.
  • 19
    Virtono

    Virtono

    Virtono

    We provide a variety of premium web hosting solutions, located in multiple data centers around the world. Virtono is a global hosting business. Everything you need to build & manage your online presence with success. Your service will be instantly activated after payment. To maximize read/write speeds we utilize only NVMe & SSD storage. You get access to admin privileges for cloud & dedicated servers. We have extensive reach worldwide so you can always choose the best option for you. Deploy your cloud VPS plan anywhere, anytime. We know each client has their own set of unique needs and solving them is our priority. We strive for efficiency, so we learn from unexpected or unplanned situations and continuously improve our service. We pride ourselves on our fast response time to never keep you waiting more than is necessary. Select the web hosting plan that matches your requirements.
    Starting Price: €2.95 per month
  • 20
    HyTrust

    HyTrust

    HyTrust

    In a multi-cloud world where technology moves at lightning speed and security often plays catchup, organizations face the daunting challenge of eliminating the gaps and resolving the inconsistencies in policy enforcement and adherence to compliance mandates. HyTrust CloudControl provides advanced privileged user access control, policy enforcement, forensic and automated compliance for private clouds. HyTrust DataControl provides powerful data-at-rest encryption and integrated key management for workloads running in any cloud environment. Encrypting workloads helps enterprises to ensure their data is protected. One of the challenges of workload encryption is scaling the management of encryption keys. HyTrust’s mission is to make private, public and hybrid cloud infrastructure more trustworthy for enterprises, service providers and government agencies. HyTrust provides solutions that automate security controls for software-defined computing, networking and storage workloads.
  • 21
    SAP NetWeaver
    Gain the tools, Web services, and application server capabilities you need to support seamless application, data, and system integration with SAP NetWeaver. Empower users and IT teams to define, change, and control decision logic. Apply semantically rich and declarative data models to enable conceptual thinking. Integrate processes across applications and organizational boundaries with a rich set of build-in functions for all domains with code pushdown capabilities. Extend SQL and cut complexity when connecting users to software – from social and collaboration platforms to mobile devices and Web applications – in real-time. Provide a socially oriented, highly interactive, and browser-based user experience on every device.
  • 22
    EDB Postgres Advanced Server
    An enhanced version of PostgreSQL that is continuously synchronized with PostgreSQL's with enhancements for Security, DBA and Developer features and Oracle database compatibility. Manage deployment, high availability and automated failover from Kubernetes. Deploy anywhere with lightweight, immutable Postgres containers. Automate with failover, switchover, backup, recovery, and rolling updates. Operator and images are portable to any cloud so you can avoid lock-in. Overcome containerization and Kubernetes challenges with our experts. Oracle compatibility means you can leave your legacy database without starting over. Migrate database and client applications faster with fewer rewrite problems. Improve the end-user experience by tuning and boosting performance. Deploy on-premises, in the cloud, or both. In a world where downtime means revenue loss, High Availability is key for business continuity.
    Starting Price: $1000.00/one-time
  • 23
    Symantec Data Center Security
    Complete server protection, monitoring, and workload micro-segmentation for private cloud and physical on-premises data center environments. Security hardening and monitoring for private cloud and physical data centers with support for Docker containers. Agentless Docker container protection with full application control and integrated management. Block zero-day exploits with application whitelisting, granular intrusion prevention, and real-time file integrity monitoring (RT-FIM). Secure OpenStack deployments with full hardening of Keystone identity service module. Data center security: monitoring. Continuous security monitoring of private cloud and physical on-premises data center environments. Optimize security performance in VMware environments with agentless antimalware protection, network intrusion prevention, and file reputation services.
  • 24
    Oracle Cloud Infrastructure
    Oracle Cloud Infrastructure supports traditional workloads and delivers modern cloud development tools. It is architected to detect and defend against modern threats, so you can innovate more. Combine low cost with high performance to lower your TCO. Oracle Cloud is a Generation 2 enterprise cloud that delivers powerful compute and networking performance and includes a comprehensive portfolio of infrastructure and platform cloud services. Built from the ground up to meet the needs of mission-critical applications, Oracle Cloud supports all legacy workloads while delivering modern cloud development tools, enabling enterprises to bring their past forward as they build their future. Our Generation 2 Cloud is the only one built to run Oracle Autonomous Database, the industry's first and only self-driving database. Oracle Cloud offers a comprehensive cloud computing portfolio, from application development and business analytics to data management, integration, security, AI & blockchain.
  • 25
    SUSE Linux Enterprise Point of Service
    SLEPOS Client provides a reliable, flexible and open platform for point-of-service, point-of-sale terminals, kiosks, self-service systems and reverse-vending systems. SLEPOS caters for the evolving needs of distributed point of service environments. Combined with SUSE Manager for Retail, SLEPOS forms a solution that offers comprehensive management of retail IT infrastructure. SLEPOS is an open operating system that supports the open standards pervasive in retail environments today. You can access the underlying source code, making it easier to tune your POS system to your individual needs. Eliminate operating system licensing fees and pay for only maintenance subscriptions. SLEPOS isn't tied to a specific device like pre-loaded systems, so you have the freedom to select hardware that you can afford or is optimal for your use case. Locking your business onto a single POS platform from a legacy vendor can put your business at risk.
  • 26
    DXC Cloud

    DXC Cloud

    DXC Technology

    Make the right technology investments at the right time and on the right platforms to drive innovation, increase customer loyalty and grow your business. Get the business outcomes you expect. When cloud is done right, it can provide up to three times the return on investment and faster business results, with less cost, risk and disruption. DXC helps you make the right decisions about what applications to migrate to cloud and when. With DXC Cloud services, you can maximize your use of data and ensure your environment remains secure. We understand the role cloud plays in mission-critical IT because we manage hybrid IT environments for many of the world’s largest companies. Our cloud migration services move 65,000 workloads to cloud each year. We’ve modernized hundreds of mainframe systems and transformed 15,000+ applications to cloud. Let us help you define, execute and manage your cloud strategy. Partner with DXC to do cloud right.
  • 27
    Compudyne

    Compudyne

    Compudyne

    The field of technology is perpetually changing, growing and evolving. Our industry-leading services keep your business secure and connected without fail. We strive to make ourselves the experts in every facet of IT services, so you don’t have to be. Secure, flexible and fully managed networks for all your business needs. Enterprise-class IT services that prioritize uptime, security and performance. We strengthen your company to withstand new and emerging security threats. Monitoring and automation to protect your business and keep everything running seamlessly. Partnering with you to engineer solutions that fit your technical needs and capabilities. Your business depends on a solid, high-speed internet connection. Interrupted connections lead to downtime and lost revenue. Keep your business connected and running smoothly with our suite of network services. Choose what you need now, knowing that our services are scalable to grow right alongside your business.
  • 28
    MBX Hatch

    MBX Hatch

    MBX Systems

    Hatch software revolutionizes hardware execution by transforming how hardware teams work. Purpose-built for the complexities of hardware management, Hatch blends disparate operational roles into a collaborative team, providing the tools and transparency to plan, manage, deploy, and support hardware solutions for improved execution, all within a single platform. Configurable products mean choices without challenges. Easily customize product configurations for each customer using a single BOM containing pre-defined component groupings for thousands of potential hardware permutations you can choose at the push of a button. Oversee engineering changes in a traceable repository. Every description, due date, status, review, and approval is consolidated in one spot. Say goodbye to archaic spreadsheets, errant emails, and extraneous applications. Tracking work in process in real-time down to the work center allows you to accurately update customers for orders in process.
  • 29
    Casa Systems

    Casa Systems

    Casa Systems

    5G technology enables network customization like never before, providing a unique opportunity to build and control the network experience end to end. Private networks, locally hosted or via the cloud, offer a path to data ownership, high levels of security, application customization, and differentiated performance using a variety of radio technologies. As 5G expands, all signs point to a new era of private and hybrid public/private networks. The move is already underway among a growing number of organizations eager to improve security, availability, and reliability. Process sensitive data on-site or securely in the cloud. Prioritize levels of security by application or location. Process data locally, and immediately, to reduce lag and minimize latency for near-real-time functions like computer vision and quality control. Flexibly set quality of service (QoS), compliance, and user experience parameters across the network.
  • 30
    Recovery Point

    Recovery Point

    Recovery Point

    Recovery Point is a pure-play provider of cyber resiliency, disaster recovery, and business continuity solutions. Our focus is on one goal, to protect the performance of your business. Through our comprehensive suite of proactive services and solutions, you can have confidence your organization is ready for any disruption. Cyber preparedness and ransomware recovery, utilizing modern data protection, automation and orchestration, and unparalleled recovery expertise. Hybrid IT and business resiliency for x86, mainframe, and heterogeneous environments, blending legacy support with modern recovery solutions. Using proven methodologies, we assess your current level of readiness and develop a clear definition of your objectives, ensuring a roadmap to operational resilience. Harness predictive and proactive strategies to ensure you stay ahead of the next generation of disruptions.
  • Previous
  • You're on page 1
  • 2
  • Next