Business Software for IBM Cloud - Page 11

Top Software that integrates with IBM Cloud as of July 2025 - Page 11

IBM Cloud Clear Filters
  • 1
    RiverMeadow

    RiverMeadow

    RiverMeadow

    RiverMeadow provides a broad range of Multi-Cloud Migration Services and Product capability that will dramatically reduce the time, cost and risk associated with moving physical, virtual and cloud-based workloads into and between public or private clouds. From Discovery and Assessment Services through Cloud Migration execution and automation, RiverMeadow accelerates your journey to the cloud with minimal disruption to your day-to-day operations, ensuring a successful outcome regardless of scale or complexity. Expert Cloud Migration Services RiverMeadow's team of dedicated Cloud Migration Experts are totally committed to your success. Our migration methodology is tested and proven over hundreds of successful projects. From discovery and assessment to migration and validation, RiverMeadow takes the risk out of the equation with our flexible, fixed-price approach. Our deep knowledge means you avoid many of the common mistakes with the delivery of cloud migrations, saving you time, money
  • 2
    Apache Brooklyn

    Apache Brooklyn

    Apache Software Foundation

    Your applications, any clouds, any containers, anywhere. Apache Brooklyn is software for managing cloud applications. Use it for: Blueprints describe your application, stored as text files in version control, components configured & integrated across multiple machines automatically, 20+ public clouds, or your private cloud or bare servers - and Docker containers, monitor key application metrics; scale to meet demand; restart and replace failed components. View and modify using the web console or automate using the REST API.
  • 3
    Portworx

    Portworx

    Pure Storage

    Run Kubernetes in production with the #1 Kubernetes platform for persistent storage, backup, DR, data security and capacity management. Easily protect, restore and migrate your Kubernetes applications in any cloud or data center. The Portworx Enterprise Storage Platform is your end-to-end storage and data management solution for all your Kubernetes projects, including container-based CaaS, DBaaS, SaaS, and Disaster Recovery initiatives. Your apps will benefit from container-granular storage, disaster recovery, data security, multi-cloud migrations and more. Easily solve the enterprise requirements needed to run data service on Kubernetes. Effortlessly offer a cloud-like DbaaS to your users without giving up control. Scale the backend data services powering your SaaS app without operational complexity. Add DR to any Kubernetes app with a single command. Easily backup and restore all your Kubernetes applications.
  • 4
    Picomto

    Picomto

    Picomto

    The digital work instructions solution to reconnect your workers with the information system. The solution to create, exploit and analyze your Digital Work Instructions in a visual, connected and smart way. Your work instructions, standard operating procedures: Interactive, visual, connected. Evolve easily your work instructions and process through time. Make your work instructions more understandable by adding pictures, videos. Ensure that operators and technician only access the latest version. Access to all the work instructions from a smartphone or tablet in online and offline mode. Build digital field-data collection forms directly into your work instructions. Analyze the use of your work instructions and make continuous improvement. Submit your work instructions for review and approval. Share only to people or group of people concerned. Translate and share your contents in more than 100 languages.
  • 5
    Eclipse Che

    Eclipse Che

    Eclipse Che

    Eclipse Che makes Kubernetes development accessible for developer teams, providing one-click developer workspaces and eliminating local environment configuration for your entire team. Che brings your Kubernetes application into your development environment and provides an in-browser IDE, allowing you to code, build, test and run applications exactly as they run on production from any machine. Eclipse Che runs in containers. All of the developer tools, the IDE and its plugins are running as containerized services. You don’t have to worry about how to configure them, install their dependencies or keeping them alive - everything is packaged together in the container. Che allows you to establish a centralized configuration for your team’s development environment and technology stacks. Eclipse Che comes with a web-based IDE, based on Eclipse Theia which provides an in-browser VSCode experience complete with the latest tooling protocols.
  • 6
    Varicent

    Varicent

    Varicent

    Varicent provides a full suite of solutions designed to help you manage the end-to-end process of all aspects of sales performance so you can improve performance and drive growth. Create smarter territory plans and more effective quota assignments with Varicent’s territory and quota planning solution. Efficient pipeline management can be challenging to achieve if you have a leaky funnel. Our revenue operations solution helps your organization improve efficiency across the full funnel so that you can increase the volume, velocity and value of deals, improve forecasting, and drive superior go-to-market results. Varicent lead to revenue helps to identify operational gaps in the business, such as lead response SLAs and lead to pipeline conversion, so you can capture missed opportunities in your pipeline, improve operational efficiency and increase revenue. Varicent is the industry-leading SPM solution that delivers a fast, flexible and easy way to pay sellers accurately and on time. 
  • 7
    Codeless Platforms Alerting Software
    Are you looking for an alerting software solution to identify what's happening in your business right now? Has your low stock level threshold been breached, has a large order been placed or is a key customer approaching their credit limit? Codeless Platforms' Alerting Software solution removes the risk of relying on employees to monitor and report on potential issues by introducing advanced business monitoring and alerting capabilities to all your business applications. Discover why adding real-time advanced business alerting capabilities to all your applications will reduce company exposure to financial risk and enhance employee performance. The Notifications & Alerts capability provides you with the ability to automatically distribute email and SMS messages 24/7, 365 days a year. Build HTML and plain text notifications and alerts using an easy-to-use editor. No coding required. Send notifications and alerts via multiple channels including email, SMS or compatible messenger APIs.
    Starting Price: $2,000
  • 8
    Centreon

    Centreon

    Centreon

    Centreon is a global provider of business-aware IT monitoring for always-on operations and performance excellence. The company’s holistic, AIOps-ready platform is designed for today’s complex, distributed hybrid cloud infrastructures. Centreon monitors the complete IT Infrastructure from Cloud-to-Edge for a clear and comprehensive view. Centreon removes blind spots, monitoring all equipment, middleware and applications that are part of modern IT workflows, from on-premise legacy assets to private and public cloud environments, all the way to the edge of the network, where smart devices and customers combine to create business value. Centreon is constantly current, able to support the most dynamic environments. With auto-discovery capabilities it can keep track of Software-Defined Network (SDN) elements, AWS or Azure cloud assets, Wi-Fi access points or any other component of today’s agile IT infrastructure.
  • 9
    Enlyft

    Enlyft

    Enlyft

    Enlyft helps B2B companies generate better leads, close more deals, and acquire more customers - faster. Enlyfts AI-driven customer intelligence platform leverages machine learning to profile and predict the buying behavior of millions of companies worldwide, based on technology use, hundreds of business attributes, and real-time buyer intent signals. Increase sales by quickly discovering, prioritizing and engaging with prospects likely to buy your solution. Enlyft’s proprietary data platform contains real-time information on company firmographics, technology usage, buying intent signals and hundreds of additional account attributes. Leverage dedicated machine learning based models to predict future outcomes, by combining Enlyft’s comprehensive account insights with your customer history. Seamlessly integrate account insights into popular B2B Sales and Marketing platforms like Salesforce, HubSpot, Dynamics 365, LinkedIn, and more. Enrich records and keep data fresh.
  • 10
    Cisco Spaces
    The latest Cisco Wi-Fi 7 access points are built with Smart Spaces in mind. They are faster, more secure, and more resilient, and come pre-integrated with the Cisco Spaces platform, out of the box. A cloud platform that connects people & things with spaces with no additional hardware and drives efficiency & cost optimizations Cisco Spaces captures location signals from people and things within your buildings. By leveraging your Cisco Network Infrastructure – Access Points, Switches, Cameras, Collab devices & Third Party IoT sensors, you can now make your buildings smarter at a low TCO (Total Cost of Ownership) and at unprecedented scale.
  • 11
    Unbound Crypto Asset Security Platform
    The only FIPS 140 L2 certified Multi-Party-computation (MPC) security platform for digital assets. With Unbound’s Crypto Asset Security Platform (CASP) you can define multi-party risk-based approval policies that adhere to local regulations, can integrate HSMs and offline signers into one MPC based platform. A FIPS 140 L2 certified software solution that eliminates this single point of failure of public-key cryptography by giving you a secure, distributed way to sign transactions while managing all your digital assets. With Unbound CASP, institutional investors don’t have to choose between regulatory adherence, peace of mind, and asset productivity. One comprehensive system that safeguards digital assets in both ‘cold’ and ‘hot’ vaults, while using MPC-based workflows and approval policies to secure the transfers between the two types of vaults. CASP supports any approval-policy structuring and any (unlimited) number of cryptographically validated signers.
  • 12
    Proofpoint Digital Risk Protection
    Proofpoint Digital Risk Protection secures your brand and customers against digital security risks across web domains, social media, and the deep and dark web. It’s the only solution that gives you a holistic defense for all your digital engagement channels. Digital Risk Protection secures your company and customers from digital risks for your entire social media infrastructure. Our solution protects your social media presence from account takeovers, social media phishing scams, and malicious content. When you request a demo, you can map your social, mobile, and domain footprint to discover your brand-owned and fraudulent or unauthorized accounts. Protect your brand and customers from social media, web domain and dark web threats. Protect your domain investments from domain squatters, typo phishing campaigns and other infringing domains. Our digital protection solution applies artificial intelligence to uncover fraudulent domains that pose a risk to your brand and customers.
  • 13
    Compass

    Compass

    Cobalt Iron

    Forget the days of managing data protection events through multiple, disconnected backup products. With Compass, you can set policies, view operations, and track granular performance for all your workloads. Compass is secure by design and the only data backup solution endorsed by Sheltered Harbor for both on-prem and cloud. It's architected to eliminate vulnerabilities in the backup process that expose data to cyberattack. If disaster strikes, your backup is ready to help you recover immediately. Born in the cloud, the Compass Architecture is designed to take full advantage of progressive technologies such as analytics, SaaS, multi-cloud, and virtualization. The Commander is an easy-to-use web dashboard providing a simple and intuitive user experience, while the Analytics Engine delivers the flexibility and insight required for today’s enterprise data protection.
  • 14
    BluSync

    BluSync

    Parablu Inc.

    Increasingly, organizations are tapping into cloud solutions that make collaboration between team members simple and secure. The need of the hour is future-ready technology that improves speed of collaboration, boosts employee productivity, and supports a culture of agile innovation, while also upholding the privacy and integrity of the content being shared and stored. BluSync™ is a secure Enterprise File Sync & Share (EFSS) solution. It is a secure platform for teams to access, edit and share files in a fast and efficient way. With BluSync, team members can connect to content in the enterprise share cloud, or mini-clouds, and access the information therein securely. BluSync™ maintains an auditable trail of activities that takes place in the cloud environment, helping organizations retain full and complete control and visibility into the way content collaboration and file sharing happens.
  • 15
    The Respond Analyst
    Accelerate investigations and improve analyst productivity with a XDR Cybersecurity Solution. The Respond Analyst™, an XDR Engine, automates the discovery of security incidents by turning resource-intensive monitoring and initial analysis into thorough and consistent investigations. Unlike other XDR solutions, the Respond Analyst connects disparate evidence using probabilistic mathematics and integrated reasoning to determine the likelihood that events are malicious and actionable. The Respond Analyst augments security operations teams by significantly reducing the need to chase false positives resulting in more time for threat hunting. The Respond Analyst allows you to choose best-of-breed controls to modernize your sensor grid. The Respond Analyst integrates with the leading security vendor offerings across important categories such as EDR, IPS, Web Filtering, EPP, Vulnerability Scanning, Authentication, and more.
  • 16
    ARIA SDS Packet Intelligence

    ARIA SDS Packet Intelligence

    ARIA Cybersecurity Solutions

    The ARIA Packet Intelligence (PI) application gives OEMs, service providers, and security professionals a better way to use SmartNIC technology to support two important use cases: advanced packet-level network analytics and cyber-threat detection, response, and containment. Network analytics: ARIA PI provides complete visibility into all network traffic and feeds valuable analytics data to packet delivery accounting tools, quality of service systems, and SLA monitoring applications. All of this helps companies provide better service and maximize revenues tied to usage-based billing. Cyber-threat detection, response, and containment: ARIA PI also feeds metadata to threat detection tools for complete visibility into all network traffic, including east-west data flows. This improves the effectiveness of existing security solutions, such as SIEMs and IDS/IPS tools, and gives security teams a better way to detect, respond, contain, and remediate even the most advanced cyber threats.
  • 17
    Cisco SecureX
    SecureX is a cloud-native, built-in platform that connects our Cisco Secure portfolio and your infrastructure. It allows you to radically reduce dwell time and human-powered tasks. Achieve simplicity, visibility, and efficiency by removing bottlenecks that slow down your teams' access to answers and actions. SecureX includes XDR capabilities and beyond with every Cisco Secure product. Get an integrated and open platform that simplifies your existing ecosystem and works with third-party solutions. Experience unified visibility with a customizable dashboard and maintain context around incidents with a consistent ribbon that never leaves you. Accelerate threat investigations and incident management by aggregating and correlating global intelligence and local context in one view. Automate routine tasks using prebuilt workflows that align to common use cases. Or build your own workflows with our no-to-low code, drag-and-drop canvas.
  • 18
    SecureIdentity PAM
    Our SecureIdentity Platform is a suite of solutions that focuses on user experience and provides verifiable trust in every activity you perform. The suite of solutions together combine to offer an overall solution to protect the identity of the user, the data and the device. Secureldentity PAM provides an interactive broker between users and administrative sessions on protected endpoints. This allows users to gain privileged access to areas they are given permission to access in the Universal Directory, while never actually exposing the credentials to the user at all. SecurEnvoy partners with leading technology platforms and companies to deliver the highest level of security and peace of mind. We have numerous pre-built integrations with many popular business applications and solutions. Read more about specific integrations or contact our technical team to discuss your specific needs.
  • 19
    SecureIdentity IAM
    SecureIdentity IAM provides enforcement of access decisions around applications and data repositories. By reading information from the Universal Directory it can make dynamic choices as to what programs a user is allowed to run and what file servers or cloud storage areas they are allowed to access. This is enforced by a client on the endpoints that intercepts requests for access to applications or data areas and vetting them against the configured policy. If the action is allowed, the user experience continues as normal with no overhead. If the action is forbidden then access to the appropriate executable or DLL files is dynamically blocked regardless of how it is invoked. Logs of all events are sent back to the platform’s event database to provide a forensic trail of activity.
  • 20
    Assure Security
    Assure Compliance Monitoring is a bundle of Assure Security features. Together, they can quickly identify security and compliance issues by producing alerts and reports on IBM i system activity, database changes and views of Db2 data. The bundle includes two features which are also available separately. Assure Monitoring and Reporting seamlessly extracts insights from IBM i journal data and delivers alerts and reports on security incidents and compliance deviations. System and database monitoring capabilities are available separately or together. Or, choose to send data directly to your enterprise SIEM solution allowing IBM i security to be monitored with all other enterprise platforms. Assure Db2 Data Monitor is a unique, innovative solution that monitors views of highly confidential Db2 data and optionally blocks records from view. Assure Security delivers market-leading IBM i security capabilities that help your organization successfully comply with cybersecurity regulations.
  • 21
    SecureIdentity DLP
    SecureIdentity DLP is a data protection portfolio of solutions (on-premises, off-premises and the cloud), which prevents the loss of data from malware, insider threat and human error. This can be achieved across multi-channels, regardless of file types, by blocking sensitive data across structured and unstructured data repositories. Our SecureIdentity DLP platform provides the identity of the user, the device and the data they are working on so you can prove exactly who is doing what at any time. With increasing integrations with other parts of the security market, DLP has become essential for protecting organizations when newer technologies are to be adopted. Our DLP solutions are unique from competitors as we address threats from trusted and un-trusted users, through unique intellectual algorithms and fingerprinting features. SecureIdentity DLP conducts real-time inspection of all protocols, even ones that are unknown, and has the ability to stop data loss immediately.
  • 22
    SecureIdentity IRAD
    The SecureIdentity Platform allows organizations to provide verifiable trust in every activity they perform. By providing the identity of the user, the device and the data they are working on you can prove exactly who is doing what at any time. SecurEnvoy partners with leading technology platforms and companies to deliver the highest level of security and peace of mind. We have numerous pre-built integrations with many popular business applications and solutions. Read more about specific integrations or contact our technical team to discuss your specific needs. Built upon artificial intelligence, SecureIdentity IRAD evaluates the user as an ongoing process and will detect any unusual activity or interaction in the user’s actions. This provides real time detailed analysis of the user interaction and allows risks.
  • 23
    Nutanix Files Storage
    Nutanix Files Storage is a simple, flexible and intelligent scale-out file storage service for the data driven era. Update non-disruptively with a single click, and manage all storage from a single pane of glass. Scale-up or scale-out flexibly on the hardware of your choice and enjoy cloud-like consumption. Know your data, who’s using it, and how—and then drive automated management and control. IDC study shows how Nutanix Files Storage reduces operational overhead by 66% over traditional siloed storage resulting in 414% ROI and 7 month pay back. Nutanix Files Storage is built to handle billions of files and tens of thousands of user sessions. As your environment grows, just one click will elastically scale your cluster up by adding more compute and/or memory to the file server VMs, or out by adding more file server VMs. All from a single platform. You can also provide object and block storage using the same resources.
  • 24
    Nutanix AOS Storage
    Nutanix AOS Storage is a modern, software-defined storage solution that replaces traditional SAN and NAS systems with a highly automated, high-performance, and scalable infrastructure. It delivers enterprise-grade capabilities through a distributed architecture, ensuring high availability and resilience. Key features include data locality, which stores data close to the application for low latency; intelligent tiering, automatically optimizing data placement between SSD and HDD tiers; and advanced data protection mechanisms like granular snapshots and self-healing capabilities. AOS Storage allows for linear scaling of performance and capacity, enabling organizations to start small and expand seamlessly as their needs evolve. Additionally, it offers flexibility in hypervisor choice and supports various data services, making it suitable for a wide range of applications and workloads.
  • 25
    Randtronics DPM Database Manager
    Randtronics DPM Database Manager is designed to protect column level data in database. The software is able to do this without having to make any application level code changes - it is totally transparent to database users and applications. DPM Database Manager are able to protect data on Oracle, Microsoft SQL Server and IBM DB for iSeries databases. The software can mask the data in protected column, or tokenise the data when integrating with DPM Token Manager. Rules are designed to be extremely flexible, and it does not matter what level of access a user or application has - the software will even protect against database admins (DBAs) viewing sensitive data. All rules can be dynamically changed using the console, and applied immediately to the data. Masking of column level data in a transparent manner - no application level code changes needed. Tokenisation of column level data by integrating with DPM Token Manager.
  • 26
    Securonix SOAR
    As the attack surface expands, there is a shortage of skilled security personnel to secure businesses and keep the attackers at bay. Rapid response is essential to mitigate the risks of cybersecurity threats, but disparate security tools are cumbersome for security teams to manage, costing time and effort. Securonix Security Orchestration, Automation, and Response (SOAR) helps security operations teams improve their incident response times by providing automation that adds context and suggesting playbooks and next steps to guide analysts. SOAR optimizes orchestration by streamlining incident response with built-in case management, integrations covering over 275 applications, and seamless access to your SIEM, UEBA, and network detection and response (NDR) solutions in a single pane of glass.
  • 27
    iSecurity AP-Journal

    iSecurity AP-Journal

    Raz-Lee Security

    iSecurity AP-Journal protects business-critical information from insider threats and from external security breaches, and notifies managers of any changes to information assets and streamlines IBM i journaling procedures. iSecurity AP-Journal logs the who, what, when and which of activities. It logs database access (READ operations) directly into the journal receivers, which is not provided by IBM i journaling and is an important component of compliance. Monitors changes to objects, application files and members. Supports periodic file structure changes to application files. Enables monitoring application files across changes to file structures. Programmable field-specific exit routines. Real-time alerts indicating changes in business-critical data; these application alerts are activated by user-defined thresholds. Comprehensive reports displaying all application changes on a single timeline in various formats.
  • 28
    Acxiom Real Identity
    Real Identity™ delivers sub second decisions to power relevant messages in real time. Real Identity enables the world’s biggest brands to accurately identify and ethically connect with people anytime, anywhere to create relevant experiences. Engage people with reach, scale and precision across every interaction. Manage and maintain identity across your enterprise by leveraging 50 years of data and identity expertise combined with the latest artificial intelligence and machine learning techniques. The adtech environment requires speed and access to identity and data to enable personalization and decisioning use cases. In a cookieless world, first-party data signals will drive these functions while the conversation continues to be between people, the brands, and the publishers. By delivering experiences that matter, across all channels, you can wow your customer and prospects while staying ahead of regulations and ahead of your competition.
  • 29
    Entrust Identity Enterprise
    The world's most proven on-prem identity & access management (IAM) solution for strong digital security. Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero Trust approach for thousands or millions of users, Identity Enterprise can be deployed on-premises or as a virtual appliance. Never trust, always verify. Protect your organization and user communities both inside and outside the perimeter. Secure workforce, consumer, and citizen identities with high assurance use case coverage including credential-based access, smart card issuance, and best-in-class MFA. Limit user friction with adaptive risk-based authentication, passwordless login, and cloud app federation. Option to use digital certificates (PKI) for a higher level of security when and where warranted, either with a physical smart card or a virtual smart card.
  • 30
    Entrust Identity Essentials
    Fast, cost effective multi-factor authentication (MFA) solution that lets Windows-based organizations realize a Zero Trust approach. Start with an easy-to-use, easy-to-deploy on-premises MFA solution, then, if and when it makes sense, migrate to the cloud with Identity as a Service. Seamless integration between the two ensures a frictionless experience while benefitting from three extra authentication options: device fingerprint, mobile push, and grid cards. Secure and enable your company´s digital business with one solution, one license. Limit user friction with adaptive authentication and self-service password resets. Provision different authentication methods for different users and requirements. Available authenticators include SMS, email, voice, and OTP. Option to leverage smart phone biometrics including fingerprint and facial match. ActiveSync for Outlook protects unauthorized devices from accessing users’ email without requiring MDM integration.