Business Software for IBM Cloud - Page 13

Top Software that integrates with IBM Cloud as of July 2025 - Page 13

IBM Cloud Clear Filters
  • 1
    Verbio

    Verbio

    Verbio

    Increase security and user experience in daily interactions with the unique potential of voice. An innovative language agnostic, cost-effective and reliable alternative to seamlessly verify and identify users in real-time. Voice biometrics allows to automatically recognize any person through the characteristics of their voice and it can smartly substitute traditional authentication methods (cards, passwords, signature, fingerprint, etc) in security access control, user verification for digital transactions or for fraud prevention and detection. With an easy and cost-effective solution, authentication through voice biometrics brings an innovative and safe experience to users, with a risk-free and remote access. Biometric Authentication and Identification through voice has never been so secure and fast with different operational uttering models for each type of client and advanced anti-spoofing methodologies.
  • 2
    ParkView Hardware Monitoring

    ParkView Hardware Monitoring

    Parkplace Technologies

    ParkView Hardware Monitoring™ is a hosted service that boosts Uptime by proactively monitoring data center storage, server and networking hardware 24/7. ParkView™​ develops baselines, specific to your environment, that help filter out noise, resulting in alerts being sent only for actionable events. ParkView™​ can even predict some events before they occur. When remediation is needed, ParkView™​ automatically opens incident tickets and triages the issue. Then, Park Place engineers are dispatched immediately to your data center, making the service experience as efficient as possible. ParkView Hardware Monitoring™ proactively identifies faults 24/7 without the need for customer action of any kind. ParkView Hardware Monitoring™ supports all storage, server and networking equipment and all OEM vendors currently supported by Park Place Technologies. We set up security features based on each customer’s individual security requirements.
  • 3
    VMware vSAN

    VMware vSAN

    Broadcom

    Reduce storage cost and complexity with VMware vSAN, an enterprise-class storage virtualization software that provides the easiest path to HCI and hybrid cloud. Integrated hyperconverged infrastructure (HCI) powered by vSAN, combined with vSphere, enables you to manage compute and storage with a single, integrated platform. Take the easiest path to future-ready HCI and hybrid cloud with an integrated solution that improves business agility, speeds operations and lowers costs. Extend virtualization to storage with a secure hyperconverged solution that leverages existing tools and is integrated with your hypervisor and leading public clouds. Achieve better price per performance by supporting the latest storage technology on industry-standard servers.
  • 4
    Imvision

    Imvision

    Imvision

    How enterprises secure their APIs. Protect your APIs wherever they are, throughout their lifecycle. Gain visibility across the board and deeply understand the business logic behind your APIs. Uncover endpoints, usage patterns, expected flows, and sensitive data exposure through full API payload data analysis. By analyzing the full API data, Imvision allows you to go beyond predefined rules in order to discover unknown vulnerabilities, prevent functional attacks, and automatically shift-left to outsmart attackers. Natural Language Processing (NLP) allows us to achieve high detection accuracy at scale while providing detailed explainability. It can effectively detect ‘Meaningful Anomalies’ when analyzing API data as language. Uncover the API functionality using NLP-based AI to model the complex data relations. Detect behavior sequences attempting to manipulate the logic, at any scale. Understand anomalies faster and in the context of the business logic.
  • 5
    Free FutureSoft

    Free FutureSoft

    Free FutureSoft

    Free FutureSoft was founded in 2005 in Greece and since then we are growing and reaching out around the globe with CRM, Clienteling and Retail projects in many regions (EMEA, APAC and Americas) and countries (Greece, Austria, England, Germany, France, Taiwan, Korea, Singapore, Hong Kong, Australia, USA, Mexico and many others). Free FutureSoft is a software solutions company, with the highest standards at providing first-class innovative services to companies and organizations in both the private and public sector. Ideal for companies with a large number of points of sales, many partners “on the move” and on an international basis that want to have a direct alignment with all of their markets in an affordable, safe and fast way. An efficient, organized, quick and particularly easy solution to register and interpret sales, returns, inventories, orders, prices and discounts. A strategic tool for customer acquisition, retention, evaluation and categorization.
  • 6
    Proofpoint Adaptive Email Security
    Proofpoint's Adaptive Email Security provides advanced, integrated protection against phishing, Business Email Compromise (BEC), and other email-borne threats. Powered by behavioral AI, this solution continuously adapts to evolving threats, offering real-time protection before, during, and after email delivery. By consolidating email security into a single platform, organizations can simplify operations, reduce vendor complexity, and achieve significant time and cost savings. It offers advanced features such as internal mail protection, real-time coaching, and unified visibility, making it an essential tool for protecting sensitive communications and ensuring compliance.
  • 7
    NEMESIS

    NEMESIS

    Aviana

    NEMESIS: Next-generation AI-powered anomaly detection technology designed to recognize fraud and waste. NEMESIS: Next-generation AI-powered anomaly detection technology pinpoints efficiency opportunities in your business management systems. Powered by AI, NEMESIS is an enterprise-ready configurable business solution platform, empowering business analysts to swiftly transform data into actionable insights. Allow the power of AI to solve your problems of overstaffing, medical errors, quality of care, and claims fraud. Benefit from NEMESIS’s uninterrupted process monitoring, unearthing a wide range of risk elements, from predicting quality issues to waste and abuse. Employ machine learning and AI to detect fraud and fraud schemes before they drain your finances. Exercise more robust controls over expenses and budget deviations, through continuous visibility of waste and abuse.
  • 8
    FuseCommander

    FuseCommander

    Commanders Act

    Today’s marketer is using a variety of channels to reach prospects and consumers and is targeting them via their preferred devices. This rise in marketing sophistication, and the number of gadgets a user leverages each day to consume digital content, make it difficult, if not impossible, to identify the person operating the device and their buying behaviours. Unless the user is logged in, modern tracking solutions rely on IP addresses and device IDs to identify the email and landing page assets a user engages with, which are typically tied to a marketing campaign. These IP addresses and device IDs provide basic information like location and previous browsing history, but not who the specific person is or their purchasing habits. FuseCommander solves for this by stitching together the user’s complete buyer’s journey including their preferred devices and channels, and the messaging that prompted them to act.
  • 9
    TrustCommander

    TrustCommander

    Commanders Act

    As a result of the increasing number of data breaches and the misuse of personal information, privacy management is a growing part of the modern marketing landscape. The General Data Protection Regulation (GDPR) has largely been perceived as a legal issue, due to the fines that can be imposed because of non-compliance, but it’s also created opportunities for brands to build greater trust with their users. In fact, according to research conducted by iProspect, 88% of global marketers say trust is a priority in 2019, and they are looking to build this trust through credibility, relevancy, and reliability. Fueled by consumer privacy laws like the GDPR, most marketers are turning to solutions like TrustCommander that alert website and mobile app users of the personal data that’s being captured, stored, and shared with third parties. TrustCommander prevents the execution of tags that weren’t explicitly authorized by users.
  • 10
    Ionic Machina
    Data security is managed in silos, but sensitive data traverses multiple applications, environments, data stores, and devices. This makes it challenging to scale data security and implement consistent access controls. Machina is your agile and dynamic authorization solution that easily handles modern challenges. Manage your shared responsibility to secure data at rest and in transit in the cloud and on-prem. Track how data is handled and accessed; audit how policies are enforced across your organization. Deliver context-aware dynamic authorization for each access request to maintain least privilege. Abstract access logic from app code to orchestrate policy enforcement across multiple environments. Implement and enforce consistent access policies in real-time across applications, repositories, workloads, and services. Monitor and analyze data handling and policy enforcement across your enterprise, and generate audit-ready proof of compliance.
  • 11
    Airlock

    Airlock

    Airlock

    Airlock's Secure Access Hub protects applications, APIs and data from identity theft and the most common attacks on Web applications. Security meets convenience, Airlock offers your customers a customer journey without media breaks with single sign-on, social registration, comprehensive user self-services and consent management. Acting in line with the market means reacting quickly. The Airlock Secure Access Hub therefore provides all important security functions such as registration, authentication and self services. So you can concentrate all your IT resources on your business processes. The Airlock Secure Access Hub helps to meet all international compliance standards - from GDPR over PSD2, PCI-DSS, OWASP to MAS. The upstream enforcement point for access policies onto applications and services allows compliance with regulations without having to make adjustments in each individual application.
  • 12
    IBM Trusteer
    IBM Trusteer helps you recognize customers and protect against malicious users, across all channels. IBM® Trusteer® helps organizations detect fraud, authenticate users and establish identity trust across the omnichannel customer journey. Through cloud-based intelligence, backed by AI and patented machine learning, Trusteer provides a holistic approach to identifying new and existing customers, while improving the user experience. More than 500 leading organizations rely on Trusteer to help secure their customers’ digital journey and support business growth. Transparently identify unauthorized access and activities. Establish cross-organizational, actionable insights through real-time assessments. Assess risk, reduce operational costs, and improve efficiencies and security. Outsmart account takeover attempts with behavioral biometrics, AI and machine learning to build digital identity trust.
  • 13
    IBM Storage Software Suite
    Improve the way you manage, protect and store data, with unlimited access to select IBM SDS products and IBM Cloud®Object Storage. IBM Storage Software Suite provides a unified interface that streamlines data management, and cost-per-TB pricing makes it easier to plan as your capacity grows. Non-production use of the software in test environments is included. Straightforward per-TB pricing for the entire suite is related to the amount of storage capacity, not the type of storage or how it is used. There are no licensing headaches when changing from one type of storage to another or from one data type to another. All the IBM Storage Software Suite products share a consistent user interface, reducing user errors and the need for training. All the products are designed to work together, streamlining integration and worldwide support for the complete solution.
  • 14
    IBM Elastic Storage System
    IBM Elastic Storage System (ESS) is a modern implementation of software-defined storage, making it easier for you to deploy fast, highly scalable storage for AI and big data. With the low latency and high performance NVMe storage technology and 8YB global file system and global data services of IBM Spectrum Scale, the ESS 3200 and ESS 5000 nodes can grow to YB configurations in a single federated global storage system from edge to core data center to the public cloud. By consolidating storage requirements and eliminating silos across multiple platforms — including Kubernetes and Red Hat OpenShift — IBM ESS can reduce inefficiency, lower acquisition costs, simplify storage management and support multiple demanding workloads, delivering high performance throughout your organization.
  • 15
    Check Point Infinity
    Organizations frequently implement multiple cyber security solutions in pursuit of better protections. As a result, they are frequently left with a patchwork security architecture that results in a high TCO. By adopting a consolidated security approach with Check Point Infinity architecture, businesses realize preemptive protection against advanced fifth-generation attacks, while achieving a 50% increase in operational efficiency and 20% reduction in security costs. The first consolidated security architecture across networks, cloud, mobile and IoT, providing the highest level of threat prevention against both known and unknown cyber-threats. 64 different threat prevention engines blocking against known and unknown threats, powered by threat intelligence. Infinity-Vision is the unified management platform for Check Point Infinity, the first modern, consolidated cyber security architecture built to prevent today’s most sophisticated attacks across networks, cloud, endpoints, etc.
  • 16
    Palo Alto Networks Threat Prevention
    Organizations face a barrage of attacks by threat actors driven by a variety of motives, including profit, ideology/hacktivism, or even organizational discontent. Attackers’ tactics continue to evolve, and traditional IPS solutions have not been able to keep pace and effectively protect organizations. To prevent intrusions, malware and command-and-control at each stage of its lifecycle and shut down advanced threats, Threat Prevention accelerates the security capabilities of our next-generation firewalls, protecting the network from advanced threats by identifying and scanning all traffic, applications, users, and content, across all ports and protocols. Daily threat intelligence is automatically curated, delivered to the NGFW and implemented by Threat Prevention to stop all threats. Reduce resources, complexity and latency by automatically blocking known malware, vulnerability exploits, and C2 using existing hardware and security teams.
  • 17
    Check Point IPS

    Check Point IPS

    Check Point IPS

    Intrusion Prevention Systems detect or prevent attempts to exploit weaknesses in vulnerable systems or applications, protecting you in the race to exploit the latest breaking threat. Check Point IPS protections in our Next Generation Firewall are updated automatically. Whether the vulnerability was released years ago, or a few minutes ago, your organization is protected. Check Point IPS delivers thousands of signature and behavioral preemptive protections. Our acceleration technologies let you safely enable IPS. A low false positive rate saves your staff valuable time. Enable IPS on any Check Point security gateway reducing total cost of ownership. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely.
  • 18
    Knoldus

    Knoldus

    Knoldus

    World's largest team of Functional Programming and Fast Data engineers focused on creating customized high-performance solutions. We move from "thought" to "thing" via rapid prototyping and proof of concept. Activate an ecosystem to deliver at scale with CI/CD to support your requirements. Understanding the strategic intent and stakeholder needs to develop a shared vision. Deploy MVP to launch the product in the most efficient & expedient manner possible. Continuous improvements and enhancements to support new requirements. Building great products and providing unmatched engineering services would not be possible without the knowledge and extensive usage of the latest tools and technology. We help you to capitalize on opportunities, respond to competitive threats, and scale successful investments by reducing organizational friction from your company’s structures, processes, and culture. Knoldus helps clients identify and capture the most value and meaningful insights from data.
  • 19
    NVIDIA RAPIDS
    The RAPIDS suite of software libraries, built on CUDA-X AI, gives you the freedom to execute end-to-end data science and analytics pipelines entirely on GPUs. It relies on NVIDIA® CUDA® primitives for low-level compute optimization, but exposes that GPU parallelism and high-bandwidth memory speed through user-friendly Python interfaces. RAPIDS also focuses on common data preparation tasks for analytics and data science. This includes a familiar DataFrame API that integrates with a variety of machine learning algorithms for end-to-end pipeline accelerations without paying typical serialization costs. RAPIDS also includes support for multi-node, multi-GPU deployments, enabling vastly accelerated processing and training on much larger dataset sizes. Accelerate your Python data science toolchain with minimal code changes and no new tools to learn. Increase machine learning model accuracy by iterating on models faster and deploying them more frequently.
  • 20
    Veritone Discovery
    Veritone offers natural language processing, transcription, and recognition technology to identify logos, on-screen text, faces, and other identifiable assets. Powered by aiWARE™, our discovery solution lets you easily search live broadcasts, prerecorded programs, and other large media libraries in near real-time. Enabled by Veritone’s Enterprise AI platform, our media discovery solution gives you powerful tools to discover large amounts of visual and audio broadcast data, and easily track and verify ads, including organic mentions. By transforming broadcasts into intelligent, highly structured content in near real-time, you can seamlessly find moments, brand mentions, and other clips within seconds. This enables you to accelerate content utilization, analysis, and insights to inform programming.
  • 21
    Dicoding

    Dicoding

    Dicoding

    Dicoding's vision is to become a leading technology education platform that encourages wider access to digital literacy for all. Dicoding has a mission to accelerate Indonesia's transition to a digital world through technology education that transforms lives. Now all nations are moving towards a digital world that relies on technological innovation in all aspects of life. We believe technology education is the foundation for every nation to be at the forefront of facing the digital world. Dicoding is here as a technology education platform that helps produce digital talent with global standards. All for the sake of accelerating Indonesia to be at the forefront. Accumulated points from events, academy, and challenges can be exchanged for productive rewards that can be used to develop further technology products. You can share the certificate of completion to various platforms, such as Linkedin, Twitter, Facebook, or copy the link.
  • 22
    Itron Enterprise Meter Data Management
    Itron Enterprise Edition (IEE) Meter Data Management System (MDMS) is an industry-leading data management solution for residential gas, water and electric meters, C&I meters and IoT sensors. Our ever-evolving platform provides you with the flexibility, value and functionality needed regardless of your deployment size. For the larger IOU market, IEE MDMS is a highly scalable enterprise application that centralizes the collection, processing, storage and complex analysis of smart device data, device events and alarms. For the municipal and cooperative market, IEE Essentials provides you with the focused capabilities of our industry-leading IEE MDMS to address your needs without sacrificing features or capabilities of the standard IEE offering, all while delivering a cost-effective solution. IEE is the most globally deployed meter data management system in the world. Our installed base comprises over 100 customers across six continents with more than 45 million meters in production.
  • 23
    IBM Engineering Test Management
    Increase efficiency and quality of systems and software delivery with test planning, workflow control, tracking and metrics reporting. Available on premises and on the cloud. IBM Engineering Test Management is a collaborative, quality management solution that offers end-to-end test planning and test asset management, from requirements to defects. Teams can seamlessly share information and use automation to speed complex project schedules and report on metrics in real time for informed release decisions. Leverage test plans that deliver quality goals, track prioritized items, and manage responsibilities. Helps you manage regulatory requirements and get ready for compliance audits. Always view accurate, real-time status without having to ask each team member. Accelerate testing using rich text, in-line images and assisted data entry and validation for precise test definition and execution. Use the cloud to get up and running faster and focus your attention on technological innovation.
  • 24
    iVision Plus
    iVision Plus Cisco wallboards empower and motivate agents to do better by providing them with real-time performance statistics in most interactive designs. Get interactive cisco contact center wallboard designs with iVision plus that provides real-time stats and metrics of both, individual and team performances. No more boxy designed wallboards, make it more impactful with NextGen wallboard designs. iVision gamification wallboards motivate agents to do better. HTML 5 wallboards for better UX and responsive. Call center wallboard software allows to set KPI thresholds to control performance and stay informed of threshold breaches for immediate action even if you are not actively monitoring and managing. Digital Signage in real-time to all internal employees will improve efficiency and productivity. The employees will no longer be required to spend long interval of time to gather operational information.
  • 25
    Premoneo

    Premoneo

    Premoneo

    Augmented Analytics, action suggestions and predictive analytics to optimize business performance by making data-driven decisions in a cloud-based software developed according to each company’s needs from the main use cases. Discover your company’s pricing optimization level. Get an initial assessment of your pricing strategy. Answer a few questions about your company’s pricing process to get your score. your company to get your score and understand if there are potential improvement areas. Premoneo offers a complete suite of solutions for the management of key activities such as pricing, forecasting and segmentation. A technology that is continuously updated to respond to new market needs. The cloud solution, thanks to its modular structure, can be designed according to the needs of each customer and embedded into any existing IT environment.
  • 26
    Intercede MyID
    MyID® credential management software enables governments and large enterprises to issue and manage digital identities using the most secure method of multi-factor authentication to citizens, large workforces and supply-chains. Today, MyID enables the strong authentication of millions of people to the data, systems and networks they need access to. For those responsible for information security, MyID provides easy integration and control over digital identity issuance and management. For end users, whether citizens or employees, MyID enables seamless, secure access to company systems, networks and resources using multi-factor authentication via a variety of devices. Faced with ever increasing threats of cyber terrorism, identity fraud and crime, MyID® provides a cyber secure credential management software solution. Where data really matters, you will find MyID. The security, reliability and interoperability of MyID software sets it apart.
  • 27
    Cyscale

    Cyscale

    Cyscale

    Map, secure, and monitor your cloud assets across platforms in under 5 minutes. Optimize operations and costs with an agentless CSPM solution that uses our Security Knowledge Graph™ to ensure scalable, consistent protection and governance. Specialists across industries rely on Cyscale to apply their expertise where it makes the biggest difference. We help you see through infrastructure layers and scale your efforts to organization-wide impact. Bridge multiple environments with Cyscale and visualise your cloud inventory in full. Discover unused, forgotten cloud resources and eliminate them to get smaller invoices from cloud providers and optimize costs for the whole organization. See accurate correlations across all cloud accounts and assets as soon as you sign up and act on alerts to avoid fines for data breaches.
  • 28
    Verizon Secure Cloud Interconnect
    Take advantage of the best cloud resources for your applications by connecting to multiple clouds from different providers with preprovisioned, secure high-speed connections. Secure Cloud Interconnect gives you on-demand and secure access to cloud service providers across the globe with all the security of our Private IP network. Organizations with sensitive workloads that need a reliable networking alternative to the public internet. Public agencies looking for more resources and bandwidth to manage point-to-point connections. Data-rich industries that want visibility into network traffic and reliable app performance. It’s a Private IP Multiprotocol Label Switching (MPLS)-based VPN network that allows organizations of all sizes to securely and quickly connect their growing cloud ecosystem to cloud service providers that are completely separated from the public internet.
  • 29
    Caveonix

    Caveonix

    Caveonix

    Traditional enterprise security and compliance solutions tend to be unscalable within hybrid and multi-cloud environments. As other “cloud-native” solutions frequently leave existing data centers behind, it can be difficult for teams to secure their enterprise’s hybrid computing operating environments. From infrastructure and services to applications and workloads, your teams can confidently protect all your cloud environments. Created by industry veterans that know digital risk and compliance inside and out, Caveonix RiskForesight is a platform trusted by our customers and partners that provides proactive workload protection. Detect, Predict and Act on threats that occur in your technology stack and hybrid cloud environments. Automate your digital risk and compliance processes, and proactively protect your hybrid and multi-cloud environments. Implement cloud security posture management and cloud workload protection, as defined by Gartner's standards.
  • 30
    iFinder

    iFinder

    IntraFind Software

    IntraFind's Enterprise Search solution iFinder is a central search platform for all of your company's data. iFinder can be connected to all of the data sources within your company. Are your data pools constantly growing? With iFinder you are well equipped for the future: our product is based on Elasticsearch technology and can therefore adapt to any volume of data with ease. It also improves search results by deploying artificial intelligence to deliver smart enterprise search functionality. iFinder helps you find important data and documents, whether they are located on a company drive, on the intranet, in wikis, or in e-mail systems. Take the next step in your company’s digital transformation by centralizing access to all company data with our enterprise search application. iFinder improves search results by deploying artificial intelligence to deliver smart enterprise search functionality.