Business Software for IBM Cloud - Page 6

Top Software that integrates with IBM Cloud as of July 2025 - Page 6

IBM Cloud Clear Filters
  • 1
    Eco

    Eco

    Spot by NetApp

    Automated Optimization for AWS Savings Plans and Reserved Instances. Simplify the planning, purchasing and optimization of your cloud commitments portfolio. Eco automates reserved instance lifecycle management, creating a high-ROI, low-risk cloud commitment portfolio that matches your current and projected needs. By identifying and selling off unused capacity and buying appropriate short-term, third-party reservations on the AWS Marketplace, Eco delivers all the benefits of long-term pricing without financial lock-in. Ensure maximum ROI on cloud commitment purchases with analysis, modification and mapping of unused reserved instances and Savings Plans to resource demands. Automate purchasing strategies for reserved instances in the AWS Marketplace throughout their lifecycle to ensure workloads are always running at optimal pricing. Enable collaboration between Finance and DevOps teams with full visibility into compute consumption and automation of optimal reserved instances.
  • 2
    MAAS

    MAAS

    Canonical

    Self-service, remote installation of Windows, CentOS, ESXi and Ubuntu on real servers turns your data centre into a bare metal cloud. Metal-As-A-Service (MAAS) provisioning with Windows, ESXi, Linux. Bare metal cloud with on-demand servers. Remote edge cluster operations. Infrastructure monitoring and discovery. Ansible, Chef, Puppet, SALT, Juju integration. Super fast install from scratch. VMWare ESXi, Windows, CentOS, RHEL, Ubuntu. Custom images with pre-installed apps. Disk and network configuration. API-driven DHCP, DNS, PXE, IPAM. REST API for provisioning. LDAP user authentication. Role-based access control (RBAC). Hardware testing and commissioning. MAAS delivers the fastest OS installation times in the industry thanks to its optimised image-based installer. Works on all certified servers from any major vendor. Discovers servers in racks, chassis and data centre networks. Supports major system BMCs and chassis controllers.
    Starting Price: $30
  • 3
    MayaData

    MayaData

    MayaData

    OpenEBS with Kubera is the answer. OpenEBS is the most popular open source storage for Kubernetes - and the fastest. Kubera adds an easy to use GUI for OpenEBS Mayastor - and APIs, auto checks and configuration, active directory authentication, built-in performance benchmarking, and additional operators to assist in upgrades and other use cases. Kubera is freely available and is delivered by MayaData when providing 24/7 support for customers to reduce operational costs and complexity. Kubera Propel is a cloud-native declarative data plane written in Rust. It’s built on the open source OpenEBS Mayastor. Kubera Propel combines breakthrough technologies like NVMe, SPDK, and emerging new storage features in the Linux kernel. OpenEBS managed by Kubera Propel has been shown independent benchmarks to deliver extremely low latency performance for data bases and other workloads running on Kubernetes.
    Starting Price: $100 per node per month
  • 4
    SQLyog

    SQLyog

    Webyog

    A Powerful MySQL Development and Administration Solution. SQLyog Ultimate enables database developers, administrators, and architects to visually compare, optimize, and document schemas. SQLyog Ultimate includes a power tool to automate and schedule the synchronization of data between two MySQL hosts. Create the job definition file using the interactive wizard. The tool does not require any installation on the MySQL hosts. You can use any host to run the tool. SQLyog Ultimate includes a power tool to interactively synchronize data. Run the tool in attended mode to compare data from source and target before taking action. Using the intuitive display, compare data on source and target for every row to decide whether it should be synchronized in which direction. SQLyog Ultimate includes a power tool to interactively compare and synchronize schema. View the differences between tables, indexes, columns, and routines of two databases.
  • 5
    Cyber Triage

    Cyber Triage

    Sleuth Kit Labs

    Fast & Affordable Forensics for Incident Response. Automated incident response software for fast, comprehensive, and easy intrusion investigations. An alert is generated from IDS or SIEM. An endpoint investigation is started from SOAR manually. Cyber Triage is deployed to the endpoint to collect data. Analyst uses Cyber Triage data to find evidence and make decisions. Manual incident response is slow, leaving the entire organization at the intruder’s mercy. By automating every phase of the endpoint forensics process, Cyber Triage ensures state-of-the-art remediation speed. Cyber threats are constantly evolving, and manual incident response can be inconsistent and incomplete. Always operating on the latest threat intelligence, Cyber Triage scours every relevant corner of a compromised endpoint. Forensic tools are often confusing, with features not needed for intrusions. Cyber Triage’s intuitive interface allows even junior staff to analyze data and assemble reports.
    Starting Price: $2,500
  • 6
    SmartSales
    SmartSales is an all-in-one field sales CRM that eliminates paperwork, allows reps on the road to sell more and better, and saves them up to 90 minutes a day. With territory management, prospects and customers are geolocated and can be segmented. With constant accuracy, it stocks, prices, and docs are always up to date. Keep track of everything, customize and generate in-depth visit reports as well as succinct notes. Action-driven, place orders right away in the app. No more extra waiting time. Sales representatives often need to carry a lot of paper documents & product catalogs to their appointments. They don't have a real-time view of stock availability during their appointments. They get their orders signed on paper documents that need to be manually re-encoded in the CRM afterward. They sometimes show outdated marketing documents to their customers. Then SmartSales is what you need!
    Starting Price: $59 per user per month
  • 7
    Spoom

    Spoom

    Spoom

    Do you really have the overview? Different reports are created throughout the company, data and statistics are kept up to date and a lot of time is spent on this. Sales, marketing, customer service, production, HR, they all have their reportings & KPIs, but what do you do with all these data? Does every stakeholder get to see it? Do you remember why you track all these data? Can you see the impact of these KPIs on your companies goals & vision? And above all, does everyone know about its existence? Make connections between different data that were previously spread across different departments. Visualize the impact of KPIs on your companies goals and vision, and discover new opportunities. Create clarity when you and your employees need it most and see the impact of data on your future business, company and teams. Make sure everybody is on the same page and every action taken by your employees can be linked to your strategy.
    Starting Price: €40 per user per month
  • 8
    IBM Spectrum Symphony
    Deliver enterprise-class management for running compute and data-intensive distributed applications on a scalable, shared grid. IBM Spectrum Symphony® software delivers powerful enterprise-class management for running compute-intensive and data-intensive distributed applications on a scalable, shared grid. It accelerates dozens of parallel applications for faster results and better utilization of all available resources. With IBM Spectrum Symphony, you can improve IT performance, reduce infrastructure costs and expenses and quickly meet business demands. Get faster throughput and performance for compute-intensive and data-intensive analytics applications to accelerate time-to-results. Achieve higher levels of resource utilization by controlling and optimizing the massive compute power available in your technical computing systems. Reduce infrastructure, application development, deployment and management costs by gaining control of large-scale jobs.
  • 9
    BMC Helix Cloud Cost
    BMC Helix Cloud Cost. Optimize your cloud costs and control your budget. BMC Helix Cloud Cost optimizes multi-cloud resource costs, eliminating wasted spend and preventing budget over-runs. Gain insight into public and private cloud spend. Prevent budget over-runs with predictive analytics and automated alerts. Eliminate wasted spend with automated optimization recommendations and actions. Empower budget owners and stakeholders with self-service views. With so many cloud buyers, continuous cost optimization is essential. What cloud services have been purchased? How are they being used? Without routine analysis and continuous optimization of cloud resource usage, you are guaranteed to overspend. Terminate idle and unused resources. Right-size over-provisioned resources. Establish power schedules for candidate workloads. Effectively use reserved instances. Automate optimization actions.
  • 10
    BMC AMI Ops Automation for Capping
    BMC AMI Ops Automation for Capping. Automate workload capping to avoid risk and optimize costs. BMC AMI Ops Automation for Capping (formerly Intelligent Capping for zEnterprise) applies automated intelligence to manage business-critical MSU capacity settings to avoid operational risk, optimize costs, and meet the needs of digital demand. Automatically manage capping limits to prioritize workloads and optimize mainframe software license costs which can consume 30-50% of the IT budget. Dynamically automate defined capacity MSU settings to optimize your monthly software costs by 10% or more. Mitigate business risk by analyzing, simulating, and automatically managing changes to defined capacity settings based on workload profile. Align capacity to business demand by ensuring MSUs are allocated to highest priority workloads. Patented technology drives capping adjustments, ensuring the most business-critical services are unaffected.
  • 11
    NVADR

    NVADR

    RedHunt Labs

    Discover, track and secure your exposed assets. You provide us the seed information, such as your company domain(s). Using 'NVADR', we discover your perimeter attack surface and monitor for sensitive data leakage. A comprehensive vulnerability assessment is performed on the discovered assets and security issues with an actual impact are identified. Continuously monitor the Internet for code / secret information leakage notify you as any such information about your organization is leaked. A detailed report is provided with analytics, stats and visualizations for your organization's Attack Surface. Comprehensively discover your Internet Facing Assets using our Asset Discover Platform, NVADR. Identify verified and correlated shadow IT hosts along with their detailed profile. Easily track your assets in a Centrally Managed Inventory complimented with auto-tagging and Assets classification. Get notification of newly discovered assets as well as attack vectors affecting your assets.
  • 12
    Titania Nipper
    Analyzing configurations with the precision and know-how of a pentester, Nipper is a must have on-demand solution for configuration management, compliance and control. Network risk owners use Nipper to shut down known pathways that could allow threat actors to alter network configurations and scale attacks. Whilst assessors use Nipper to reduce audit times by up to 80% with pass/fail evidence of compliance with military, federal and industry regulations. Providing complementary analysis to server-centric vulnerability management solutions, Nipper’s advanced network contextualization suppresses irrelevant findings, prioritizes risks by criticality, and automates device-specific guidance on how to fix misconfigurations.
  • 13
    AWS GovCloud
    Amazon's Regions designed to host sensitive data, regulated workloads, and address the most stringent U.S. government security and compliance requirements. AWS GovCloud (US) gives government customers and their partners the flexibility to architect secure cloud solutions that comply with the FedRAMP High baseline; the DOJ’s Criminal Justice Information Systems (CJIS) Security Policy; U.S. International Traffic in Arms Regulations (ITAR); Export Administration Regulations (EAR); Department of Defense (DoD) Cloud Computing Security Requirements Guide (SRG) for Impact Levels 2, 4 and 5; FIPS 140-2; IRS-1075; and other compliance regimes. AWS GovCloud (US-East) and (US-West) Regions are operated by employees who are U.S. citizens on U.S. soil. AWS GovCloud (US) is only accessible to U.S. entities and root account holders who pass a screening process. AWS GovCloud (US) Regions can help customers address compliance at every stage of their cloud journey.
    Starting Price: $0.02 per GB
  • 14
    Delinea Cloud Access Controller
    Gain granular control over web applications and web-based cloud management platforms. Delinea's Cloud Access Controller provides a comprehensive PAM solution that operates at cloud speed and is quick to deploy and secure access to any web application. With Cloud Access Controller, you can easily integrate your existing authentication solutions with any web application without having to write any additional code. Apply granular RBAC policies that enforce least privilege and zero trust initiatives, even to custom and legacy web applications. Specify what an individual employee is allowed to read or modify within any web application. Grant, manage and revoke access to cloud applications. Specify who gets access to what, at a granular level. Track usage of each and every cloud application. Clientless session recording without agents. Secure access to all web applications, including social media, custom, and legacy web applications.
  • 15
    APWI

    APWI

    APWI

    APWI was created to deal with print cost control and interface problems. Our print management and data conversion products allow you to effectively control costs and facilitate distribution of documents. Our software solutions transform, manage and distribute your documents, enabling rapid and cost-efficient deployment of applications. Our solutions also enable you to keep track of which departments and users are using your printing assets most heavily so you can design and implement effective cost-reduction policies. RXforPrint is a valuable tool that tracks print jobs by user, by device, by department and by cost. Our print tracking software provides comprehensive print analysis reports showing print activity by users, printers and departments. It can help reduce the cost of copier and print prices by thousands of dollars a month. HostServe Data Conversion and Enterprise Output Management solution is our Windows-based document delivery and interconnectivity system.
  • 16
    Vergic Engage
    Companies and organizations have invested heavily digitalizing services for their customers, making it easier to access info, products and self-services. It’s used all the time and from all devises. Yet, when a customer want’s to interact or is in need of assistance, they are often forced out of their digital context into a traditional channel like phone or email. The opportunity to help the customer ‘at the moment of need’ in a digital context is then lost and money invested in digital transformation is wasted. As a company you never have to miss any opportunity to sell or serve your digital customers. No matter if your goal is on-line sales, customer support, lead generation or complex support processes; with Vergic Engage you can master the digital customer journey. Any company or organisation, no matter vertical, can define some sort of customer journey. The Vergic Engage Platform will orchestrate that journey while keeping the customer in a digital context.
    Starting Price: €35 per user per month
  • 17
    Ricoh

    Ricoh

    Ricoh

    Accelerate growth with scalable public, private, and hybrid cloud solutions. Cloud computing frees you to focus on your core business goals. You get the technology, tools, and apps you need – without traditional infrastructure limitations and necessary ongoing maintenance costs. When you choose the public cloud, you choose high-performance, secure, and cost-effective business tools that don’t require in-house infrastructure or staff to setup. For many companies, the minimal start-up costs and pay-as-you-go fees make the public cloud an attractive way to get started. Initial assessment. Strategic planning for the optimal cloud solution. Build and deployment. Security management of all users to ensure functionality, compliance, and disaster recovery process implementation. Post-setup support. Proactive scanning, monitoring, and reporting to ensure optimal use and maximum data security.
  • 18
    OfficeScan

    OfficeScan

    Trend Micro

    The threat landscape used to be black and white, you kept the bad stuff out and the good stuff in. Now it’s harder to tell the good from the bad, and traditional signature-based antivirus approaches alone are a weak defense against ransomware and unknown threats, which often slip through. Next-generation technologies help with some threats but not others, and adding multiple anti-malware tools on a single endpoint results in too many products that don’t work together. To complicate matters your users are increasingly accessing corporate resources from a variety of locations and devices, and even services in the cloud. You need endpoint security that is smart, optimized, and connected, from a proven vendor you can trust. Trend Micro™ OfficeScan™ infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint.
  • 19
    Trend Micro ServerProtect
    Enterprise servers can be a vulnerable, centralized point of information exchange. Even from inside the network, users or applications without adequate protection can unintentionally upload infected files to the server, which can spread to other systems that access these files. Additionally, large organizations may have hundreds or thousands of individual server machines that require monitoring, configuration, and maintenance. More importantly, today’s sophisticated attacks can target multiple points on the network and leave unseen trails of damage and the potential for re-infection. Trend Micro™ ServerProtect™ delivers the industry’s most reliable virus, spyware and rootkit protection while simplifying and automating security operations on servers. ServerProtect scans and detects malware in real time and incorporates cleanup capabilities to help remove malicious code and repair system damage.
  • 20
    ScanMail

    ScanMail

    Trend Micro

    More than 90 percent of targeted attacks begin with a spear phishing email, which means your mail server security is more important than ever. Unfortunately, most mail server security solutions, including the limited set of built-in protections in Microsoft® Exchange™ 2013 and 2016, rely on pattern file updates, which only detect traditional malware. They don’t include specific protections to detect malicious URLs or document exploits commonly used in targeted attacks or advanced persistent threats (APTs). ScanMail™ Suite for Microsoft® Exchange™ stops highly targeted email attacks and spear phishing by using document exploit detection, enhanced web reputation, and sandboxing as part of a custom APT defense, protection you don’t get with other solutions. In addition, only ScanMail blocks traditional malware with email, file, and web reputation technology and correlated global threat intelligence from Trend Micro™ Smart Protection Network™ cloud-based security.
  • 21
    Trend Micro PortalProtect
    Many organizations use Microsoft SharePoint to connect with employees, partners, and customers for real-time collaboration. SharePoint capabilities enable businesses to move beyond simple content repositories, helping employees build team sites, create intranet and extranet portals, utilize wikis and blogs, and create social communities. These dynamic collaboration environments help improve your productivity, but they also increase your security risks, especially when opened to external parties. Trend Micro PortalProtect secures your collaborations with a dedicated layer of protection that guards against malware, malicious links, and other threats that SharePoint administrators are often unaware of. Its web reputation technology blocks malicious links from entering your web portals, while its powerful content filtering scans both files and web components of SharePoint.
  • 22
    Qualys WAS
    Robust cloud solution for continuous web app discovery and detection of vulnerabilities and misconfigurations. Fully cloud-based, it’s easy to deploy and manage, and scales to millions of assets. WAS finds and catalogs all web apps in your network, including new and unknown ones, and scales from a handful of apps to thousands. With Qualys WAS, you can tag your applications with your own labels and then use those labels to control reporting and limit access to scan data. WAS’ dynamic deep scanning covers all apps on your perimeter, in your internal environment and under active development, and even APIs that support your mobile devices. It also covers public cloud instances, and gives you instant visibility of vulnerabilities like SQLi and XSS. Authenticated, complex and progressive scans are supported. With programmatic scanning of SOAP and REST API services, WAS tests IoT services and APIs used by mobile apps and modern mobile architectures.
  • 23
    Junos Traffic Vision

    Junos Traffic Vision

    Juniper Networks

    Junos Traffic Vision is a licensed traffic sampling application for MX Series 3D Universal Edge Routers. It provides details on network traffic flows that is useful for a wide variety of operations and planning activities. Junos Traffic Vision monitors packets as they are processed by the router, and captures details such as source and destination addresses, packet and byte count information. These details are aggregated and exported in a standards-based format for analysis and presentation by Juniper and third-party-based tools that support usage-based accounting, traffic profiling, traffic engineering, attack and intrusion detection, and SLA monitoring. Implemented inline and on service cards that provide high performance and scale, Junos Traffic Vision can be deployed in both active and passive configurations and can take place alongside lawful intercept filtering and port mirroring without impacting performance.
  • 24
    IBM Fusion
    The easiest way to deploy OpenShift applications and watsonx. Fusion is available as two flexible options to support your hybrid cloud needs. Fusion HCI System provides a fully integrated, turnkey platform for running and maintaining all of your on-premises Red Hat OpenShift applications. Fusion software runs anywhere Red Hat OpenShift runs—on public cloud, on-premises, bare metal and virtual machines. Integrates hardware, Red Hat OpenShift and data services, eliminating compatibility issues and reducing setup time enabling you to get your containerized applications up and running in record time enabling faster innovation and reduced time-to-market. Simplifies infrastructure and data services for OpenShift applications by enabling platform engineers to centrally manage OpenShift, streamline operations, optimize resource utilization and reduce operational complexities and costs.
  • 25
    IBM ILOG CPLEX Optimization Studio
    Build and solve complex optimization models to identify the best possible actions. IBM® ILOG® CPLEX® Optimization Studio uses decision optimization technology to optimize your business decisions, develop and deploy optimization models quickly, and create real-world applications that can significantly improve business outcomes. How? IBM ILOG CPLEX Optimization Studio is a prescriptive analytics solution that enables rapid development and deployment of decision optimization models using mathematical and constraint programming. It combines a fully featured integrated development environment that supports Optimization Programming Language (OPL) and the high-performance CPLEX and CP Optimizer solvers. It’s data science for your decisions. IBM Decision Optimization is also available within Cloud Pak for Data where you can combine optimization and machine learning within a unified environment, IBM Watson® Studio, that enables AI-infused optimization modeling capabilities.
  • 26
    Lyftrondata

    Lyftrondata

    Lyftrondata

    Whether you want to build a governed delta lake, data warehouse, or simply want to migrate from your traditional database to a modern cloud data warehouse, do it all with Lyftrondata. Simply create and manage all of your data workloads on one platform by automatically building your pipeline and warehouse. Analyze it instantly with ANSI SQL, BI/ML tools, and share it without worrying about writing any custom code. Boost the productivity of your data professionals and shorten your time to value. Define, categorize, and find all data sets in one place. Share these data sets with other experts with zero codings and drive data-driven insights. This data sharing ability is perfect for companies that want to store their data once, share it with other experts, and use it multiple times, now and in the future. Define dataset, apply SQL transformations or simply migrate your SQL data processing logic to any cloud data warehouse.
  • 27
    Harmony Mobile

    Harmony Mobile

    Check Point

    In the new normal, while employees are increasingly accessing corporate data from their smartphones, your business is exposed to breaches more than ever. Harmony Mobile delivers complete protection for your mobile workforce that is simple to deploy, manage and scale. Protecting corporate data across the mobile attack surface: apps, networks and OS. Scalable and easy-to-manage security for any type of mobile workforce. Quick user adoption with zero impact on user experience or privacy. Prevents malware from infiltrating employees’ devices by detecting and blocking the download of malicious apps in real-time. By extending Check Point’s industry-leading network security technologies to mobile devices, Harmony Mobile offers a broad range of network security capabilities. Ensures devices are not exposed to compromise with real-time risk assessments detecting attacks, vulnerabilities, configuration changes, and advanced rooting and jailbreaking.
  • 28
    Automai Robotic Process Automation
    Automai provides Robotic Process Automation (RPA) to automate and manage even the most complicated front and back office tasks on any application(s). No scripting. Record your scenario, then edit or build on it with simple commands in the clear interface provided. Automai has the only RPA product that shares a platform with testing and monitoring components allowing scenarios to be built once and utilized in a variety of functions in the same enterprise. With Automai Robotic Process Automation (RPA), you CAN automate those repetitive tasks and processes. We’ve been using and improving our robotic automation technology for a long time, since it we started emulating human behavior for our automated testing solutions in 2000. And it’s the best out there. Our robotic automation intelligently copes with changing variables that human’s process in decision-making every day, learning what’s important to your business, and adapting so you can focus on bigger issues.
  • 29
    Predator PDM

    Predator PDM

    Predator Software

    Predator PDM is a paperless manufacturing driven Production Data Management application designed to organize and control CNC Programs, Robot Programs, CMM Programs, PLC Programs, setup sheets, safety procedures, CMM programs, quality documents, and others with complete revision control. Predator PDM supports paperless shop floor operation with integration with DNC, CNC Editor, Virtual CNC, MDC and Tracker. Predator PDM provides the right balance of flexibility, control and accountability to simplify adhering to international standards including CFR21 Part 11 or AS9100. Quality personnel will appreciate that Predator PDM helps to ensure that quality priorities are met by providing documented and structured change management to help avoid FDA, FAA and DOD audit findings. Manufacturing Engineering and CNC programming personnel will appreciate the day to day benefits of visualizing the manufacturing process, and revision control of manufacturing files.
    Starting Price: $2,500
  • 30
    Predator MDC

    Predator MDC

    Predator Software

    Predator MDC is real-time machine monitoring software that automatically collects, reports, charts and processes real-time shop floor manufacturing data including OEE, cycle time, idle time, setup time, teardown time, machine downtime and more. Predator MDC improves manufacturing by supplying accurate shop floor productivity KPIs and metrics to improve operations and to make better decisions. Predator MDC creates a continuously up to date knowledge base of your manufacturing performance. It quantifies how well your machines are utilized, the productivity of your people and the rates of production. Predator MDC can establish and compare continuous improvement results for lean manufacturing efforts. Predator MDC organizes your real-time data into actionable KPIs and metrics for availability, quality and performance. KPIs and metrics for specific machines or rolled up KPIs and metrics for an entire department across multiple plants are available with a few mouse clicks.
    Starting Price: $1,500