Business Software for IBM i

Top Software that integrates with IBM i as of July 2025

IBM i Clear Filters

Compare business software, products, and services to find the best solution for your business or organization. Use the filters on the left to drill down by category, pricing, features, organization size, organization type, region, user reviews, integrations, and more. View and sort the products and solutions that match your needs in the results below.

  • 1
    Kiuwan Code Security
    Security Solutions For Your DevOps Process. Automatically scan your code to identify and remediate vulnerabilities. Compliant with the most stringent security standards, such as OWASP and CWE, Kiuwan Code Security covers all important languages and integrates with leading DevOps tools. Effective static application security testing and source code analysis, with affordable solutions for teams of all sizes. Kiuwan includes a variety of essential functionality in a single platform that can be integrated directly into your internal development infrastructure. Fast Vulnerability Detection: Easy and instant setup. Start scanning and get results in just minutes. DevOps Approach To Code Security: Integrate Kiuwan with your Ci/CD/DevOps pipeline to automate your security process. Flexible Licensing Options: Plenty of options, one time scans or continuous scanning. Kiuwan also offers a Saas or On-Premise model.
  • 2
    Storagepipe

    Storagepipe

    Storagepipe

    Storagepipe provides world-class Cloud and Data Protection Services for companies of all sizes. We specialize in robust and secure Managed Private Cloud, Public Cloud, Cybersecurity, and Disaster Recovery services that are all supported by our first-class in-house technical team. We deliver outstanding value and service, using state-of-the-art technology including Veeam, VMWare, and Microsoft 365 as well as proprietary solutions for specialized platforms like IBM iSeries. Storagepipe is driven to be your trusted partner and our customers trust us with the protection and high availability of their mission-critical systems. Our focus is on a Storagepipe Experience that meets the reliability, scalability and support that your business demands.
  • 3
    IBM Watson
    Learn how to operationalize AI in your business. Watson helps you predict and shape future outcomes, automate complex processes, and optimize your employees’ time. Infuse Watson into your workflows to predict and shape future outcomes, automate complex processes, and optimize your employees’ time. Infuse Watson into your apps and workflows to tap into organizational data and put AI to work across multiple departments – from finance, to customer care, to supply chain. With Watson, you can create better, more personalized experiences for customers, scale the expertise of your best people across the organization, and make smarter decisions based on deep insights from data. Watson products and solutions are grounded in science, human-centered design, and inclusivity. An open, faster, more secure way to move more workloads to cloud and AI.
  • 4
    Curbstone

    Curbstone

    Curbstone Corporation

    Credit Card, ACH, and IVR Payment SaaS for Your IBM i, iSeries, and AS/400. Ensure a simple, stress-free implementation using native RPG APIs for the IBM i, iSeries, and AS/400. Eliminate manual data entry, achieve real-time authorizations, and perform background and recurring charges using cards on file. Take your entire existing infrastructure out of scope for PCI, helping you spend less time on compliance reporting and audits. Reduce your risk – and protect your data – by eliminating sensitive data on your systems with remote payment tokenization. Control your costs with a flat-fee pricing structure. We’ll show you easy ways to improve transaction quality, reduce unnecessary downgrade fees, and secure the best possible credit card processing rates.
    Starting Price: $17,000
  • 5
    Connectria

    Connectria

    Connectria

    Connectria provides TRiA Cloud Management which is a comprehensive cloud governance to optimize spending, manage performance, and ensure continuous security & compliance. It’s the only Cloud Management Platform (CMP) that allows you to manage multiple clouds – from legacy IBM i environments through x86 – into today’s hyper-scale AWS, Azure and GCP clouds – under a single dashboard-driven platform. There isn’t another CMP in the market that is as robust as the TRiA Cloud Management Platform. Optimize visibility, and cloud spending, and manage compliance and security. We combine strategy, migration, managed services, and modernization capabilities to deliver holistic solutions for complex infrastructure challenges. Whether you need to migrate legacy systems out of the data center, adopt cloud-native technologies, or shift IT resources from administrative to strategic initiatives, we’ll be there every step of the way to help you connect the dots between where you are today.
    Starting Price: $199 per month
  • 6
    TestBench for IBM i

    TestBench for IBM i

    Original Software

    Testing and test data management for IBM i, IBM iSeries, AS/400. Complex IBM i applications must be checked from top to bottom, right into the data, wherever it is. TestBench IBM i is a comprehensive, proven test data management, verification and unit testing solution that integrates with other solutions for total application quality. Stop copying the entire live database and hone in on the data you really need. Select or sample data with full referential integrity preserved. Simply decide which fields need to be protected and use a variety of obfuscation methods to protect your data. Track every insert, update and delete including intervening data states. Create rules so that data failures are flagged to you automatically. Avoid the painful save/restores and stop attempting to explain bad test results based on poor initial data. Comparing outputs is a well proven method to verify your test results but it can be laborious and prone to error. This unique solution can save hours.
    Starting Price: $1,200 per user per year
  • 7
    PKZIP

    PKZIP

    PKWARE

    Year after year, the amount of data being stored and exchanged around the world increases at an exponential rate. Costs for data storage and transmission continue to grow, whether organizations maintain their files on-premises or in the cloud. An efficient, flexible solution for data compression is essential for managing costs and resource demands. Having introduced the ZIP file format nearly three decades ago, PKZIP continues to set the worldwide standard for data compression and file management. With PKZIP, organizations can compress files by up to 95%, reducing storage costs and greatly improving file transmission times. PKZIP can handle even the largest compression tasks, with capabilities to include more than 2 billion files in a single archive and compress files over 9 exabytes in size. PKWARE’s lossless compression technology ensures that all data (including file metadata) is retained when a file is zipped.
    Starting Price: $29 per copy
  • 8
    LongRange

    LongRange

    LongRange

    The LongRange mobile app builder is based on two fundamental principles, the mobile app development and maintenance process must have a short time-to-market and a justifiable total cost of ownership, both vitally important to IBM i development sites constrained by restricted budgets, “never enough” time and ever-present resource limitations. Use your existing development tools, with your RPG, COBOL, or CL expertise and the LongRange mobile app builder you can deliver mobile apps to a user community quickly, and you can maintain and extend them with a minimum of time and cost. LongRange is a native mobile app, like Twitter, Skype, and Salesforce, downloaded from the appropriate App Store; it executes as a native app, very fast and with rock-solid reliability. It’s not a web app that runs on the server and it doesn’t rely on a web browser to deliver information to a mobile device. It does not rely on HTML, CSS, and JavaScript like a hybrid app.
    Starting Price: Free
  • 9
    CoolSpools

    CoolSpools

    Ariadne Software

    The Spool File Converter for AS400 (IBM i). Converts AS400 spool files and database files to PDF, Excel, CSV, XML and HTML. CoolSpools is the complete information management solution for AS400 (IBM i / iSeries) providing a spool file converter solution with management and distribution in multiple formats. CoolSpools helps you give your users and customers meaningful reports, at the right time and, just as importantly, in the right formats.
    Starting Price: $3835 one-time payment
  • 10
    Fortra Sequel
    Sequel delivers business intelligence solutions for Power Systems™ running on IBM i. With powerful query and reporting capabilities, Sequel makes it easy to access, analyze, and distribute data exactly how you want it. Sequel delivers affordable IBM i business intelligence to IT, business users, and executives alike. Today, thousands of customers worldwide count on Sequel for access to the data they need, when they need it. IT users can get the software up and running quickly, easily integrate existing queries from Query/400, and deliver data to users at lightning speed. Plus, with Sequel’s intuitive interfaces (green screen, graphical user interface—Sequel Viewpoint, and browser), IT can turn data access over to business users and executives—and free up their time to respond to more critical requests efficiently. iSeries reporting just got easier.
  • 11
    Gravity

    Gravity

    Remain Software

    Gravity is a multi-platform (IBM i, Windows, Unix, Linux) Project and Workflow Management software for any organization or a development team that desires easy, fast and visible management of various projects and development processes. Gravity supports process automation and helps to streamline all changes taking place within your organization – regardless the methodology and terminology you use. What makes Gravity different from other workflow management solutions is the possibility of tailoring workflow according to users’ specific needs, with their own, personalized activities (like sending an e-mail or managing a calendar, or more complex steps like starting a build on the build-server, enforcing users to enter sign-off information). Gravity work management is very simple to use and it enables users to manage all activities with only one solution.
    Starting Price: $2 per user per month
  • 12
    Automate Schedule
    Powerful workload automation for centralized Linux job scheduling. When you’re able to automate all your workflows across your Windows, UNIX, Linux, and IBM i systems with a job scheduler, your IT team has more time to tackle more strategic projects that impact the bottom line. Bring isolated job schedules from cron or Windows Task Scheduler enterprise-wide. When your job scheduler integrates with your other key software applications, it’s easier to see the whole picture, leverage data across the organization, and unify your job schedules. Be more efficient so you can meet your workload automation goals. Automated job scheduling makes your life easier and transforms the way you do business. Build dynamic, event-driven job schedules across servers and take dependencies into account—supporting your business goals with better workflows. Automate Schedule offers high availability for a master server and a standby server so if an outage were to occur, important tasks would continue.
  • 13
    Webdocs

    Webdocs

    Fortra

    Webdocs document management solutions provide forms and document management for the cloud, Windows, and IBM iSeries systems. With document management software, you can electronically capture, manage, and distribute all of your documents and data. Automatically route electronic documents and other files through approval, payment, order-to-ship, and other processes without the paper hassle. Connect ERP, POS, LOBS, and other systems to your document management software to keep data consistent across the organization. No more printing spool files or struggling to deliver reports in the right format. Create and deliver reports all in one tool. Webdocs provides the basis for electronic document management, and other branches of Webdocs software specialize in AP processes, forms management, and document creation and delivery.
  • 14
    Powertech Antivirus
    Many organizations have diverse technology stacks that run some combination of Windows, Linux, AIX, or IBM i. But most antivirus software solutions are designed just for Windows. Using a native tool that prevents scan failure and security issues helps ensure each platform in your environment is uniquely protected against viruses, worms, and malware threats. Powertech Antivirus is the only commercially available server-level antivirus solution, providing native scanning for IBM Systems, including IBM i, AIX, Linux on Power, and LinuxONE. With one of the most comprehensive sets of virus signatures available on any platform, Powertech Antivirus keeps up-to-date by automatically downloading the latest virus definitions and enhancements.
  • 15
    IBM Db2
    IBM Db2 is a family of data management products, including the Db2 relational database. The products feature AI-powered capabilities to help you modernize the management of both structured and unstructured data across on-premises and multicloud environments. By helping to make your data simple and accessible, the Db2 family positions your business to pursue the value of AI. Most of the Db2 family is available on the IBM Cloud Pak® for Data platform, either as an add-on or an included data source service, making virtually all of your data available across hybrid or multicloud environments to fuel your AI applications. Easily converge your transactional data stores and rapidly derive insights through universal, intelligent querying of data across disparate sources. Cut costs with the multimodel capability that eliminates the need for data replication and migration. Enhance agility by running Db2 on any cloud vendor.
  • 16
    PTC Implementer
    Providing developers and IT managers with an easy to use environment that speeds development by managing and streamlining critical change management and development processes. PTC Implementer is the premier software configuration management and deployment solution for IBM i. Utilizing host-based and graphical user interfaces, Implementer provides the simplicity necessary for first time users, and the breadth and depth for more advanced users. Simplifying development and software change management while gaining more development, larger libraries, and new languages. With Implementer, you receive a secure, scalable and flexible solution to protect your production, development, and testing environments on IBM i servers. An intuitive environment to make host-based development faster. Ensures proper controls over initiating and approving changes from multiple developers. Integrate and adapt seamlessly to dozens of the most popular applications packages in the market.
  • 17
    iSecurity Audit

    iSecurity Audit

    Raz-Lee Security

    iSecurity Audit enhances native IBM i auditing by monitoring and reporting on all activities in the IBM i environment. It employs real-time detection to identify security events as they occur and record details in a log file. Audit logs can be displayed in simple, graphical formats with accompanying explanations for each entry to aid quick interpretation of statistical information. More importantly, real-time detection triggers alerts and/or takes immediate corrective action. iSecurity Audit is the only security auditing product available for the IBM i that is designed from the ground up for ease-of-use by non-technical personnel such as outside auditors and managers. Audit is a cutting-edge security auditing application that examines events in real time, and triggers alerts and other responsive actions to potential threats. It contains a powerful report generator with over one hundred pre-fabricated built-in reports.
  • 18
    Robot Monitor
    Robot Monitor is the most comprehensive, in-depth monitoring solution available for Power Systems environments running IBM i alone or alongside VIOS, AIX, or Linux on Power. Industry-leading technology gives you the highest degree of monitoring for your critical IT infrastructure. By monitoring the performance of your Power servers in real time—including system status, disk, network, availability, application data, and JDBC/ODBC activity—you and your team can proactively respond to issues before they impact user productivity or resources. Highly customizable, modern dashboards provide visibility into all your metrics, elements, and status conditions so you don’t miss a thing. See all your data from a single, central interface to avoid downtime and optimize performance. Not watching the dashboard? Robot Monitor can send out notification when things go wrong.
  • 19
    IBM i Server Suites
    Pressured to maintain constant system availability in fast-paced business environments, IT teams must do more with less. IBM i server monitoring software saves time and resources by automating monitoring and corrective actions that would otherwise be performed manually. A single download and simple implementation makes it easy to install your solution across the enterprise. Once you’re up and running, enjoy intuitive features, automatic upgrades, and built-in templates. Pick and choose the modules you actually need. Our tiered solution suites progress from entry-level monitoring to advanced operations management. As your business grows, it’s easy to add functionality to meet monitoring, automation, and reporting requirements. Simplify your monitoring of multiple servers and applications with at-a-glance management—anytime, anywhere.
  • 20
    Ricoh

    Ricoh

    Ricoh

    Accelerate growth with scalable public, private, and hybrid cloud solutions. Cloud computing frees you to focus on your core business goals. You get the technology, tools, and apps you need – without traditional infrastructure limitations and necessary ongoing maintenance costs. When you choose the public cloud, you choose high-performance, secure, and cost-effective business tools that don’t require in-house infrastructure or staff to setup. For many companies, the minimal start-up costs and pay-as-you-go fees make the public cloud an attractive way to get started. Initial assessment. Strategic planning for the optimal cloud solution. Build and deployment. Security management of all users to ensure functionality, compliance, and disaster recovery process implementation. Post-setup support. Proactive scanning, monitoring, and reporting to ensure optimal use and maximum data security.
  • 21
    Powertech Exit Point Manager for IBM i
    Protect your organization from the high cost of security breaches by tracking and monitoring data access with Powertech exit point manager for IBM i software. An easy-to-use interface enables administrators to better follow security policy, resulting in a network that’s more secure, more likely to be compliant with regulatory requirements, and less vulnerable to threats. Secure network access points that traditional menu security plans don’t protect. Safeguard your IBM i systems by closing any and all back doors to the network, including FTP, ODBC, SQL, JDBC, and remote command. Monitoring and controlling exit point traffic helps restrict data access only to authorized users. Limit access to specific objects and libraries to only the users and groups who have a demonstrated business need. Assign rules by IP address, allowing system access to be limited to approved locations. Easily change and apply rules across your network, with Powertech exit point manager for IBM i.
  • 22
    Robot Space
    You’ll spend less time worrying about your disk space when your daily disk space monitoring is completely automated—and you’ll spend less money over the long run by better managing your objects and files, so you don’t purchase unnecessary, expensive extra disk. Understanding current trends within your storage environment gives you greater visibility to predict your organization’s disk space needs and plan for the future accordingly, thanks to the historical metrics visible in your disk space analyzer. Regular monitoring for everything from active jobs to spooled files using flexible storage thresholds helps you stay on top of disk space at all times, not just when you’re reaching capacity. Drill into disk storage problems to discover what’s eating away at your disk space. See historical disk growth metrics, compare against previous collections, and use cleanup tools for addressing obsolete objects and file reorganization.
  • 23
    OpenText Exceed
    OpenText™ Exceed™ is a Windows remote access solution for graphically demanding Linux and UNIX software solutions, such as CAD and CAM. Exceed integrates Windows desktop with UNIX, Linux, VMS, X Window System and IBM iSeries and z/OS system environments. A secure, high-performance X Window server, Exceed offers secure and reliable access to X Window applications from Microsoft Windows and Citrix virtual desktops over the LAN. Many engineering, architectural and product design software solutions are implemented on Linux and UNIX, using Linux X Window (X11) graphics technology. A Windows X Server runs these graphical UNIX and X11 applications on Microsoft Windows, rather than costly high-end graphical Linux and UNIX workstations. In order to access the graphically demanding software from Windows, organizations require high performance remote access LAN to LAN software.
  • 24
    Alliance Key Manager

    Alliance Key Manager

    Townsend Security

    Once data is encrypted, your private information depends on enterprise-level key management to keep that data safe. The solution provides high availability, standards-based enterprise encryption key management to a wide range of applications and databases. Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. Encryption keys can be restricted based on several criteria. The most permissive level requires a secure and authenticated TLS session to the key server. Individual encryption keys can be restricted to users, groups, or specific users in groups. Enterprise-wide groups can be defined and keys can be restricted to Enterprise users, groups, or specific users in groups.
    Starting Price: $4,800 one-time payment
  • 25
    WEBDEV

    WEBDEV

    Windev

    Responsive web design, WEBDEV allows you to easily develop Internet and Intranet sites and applications (WEB & SaaS) to manage data and processes. WEBDEV also generates PHP. WINDEV supports all databases. WEBDEV also supports all the databases that use ODBC drivers or OLEDB providers. The WINDEV, WEBDEV and WINDEV Mobile environments are compatible and share project elements. It has never been easier to build multi-target applications. The developer can focus on key business requirements, and not on the code, applications can finally meet your needs. Up to 20 times less code, develop applications in no time! Shorter time to market, allows you to gain market share. Software is easier to develop and improved reliability. Complete application RAD generator for PC, web, and mobile, template creation (patterns, inheritance & MVP). The ease of use and speed that allow you to develop and realize even your most ambitious projects.
    Starting Price: $1,703 one-time payment
  • 26
    WINDEV

    WINDEV

    Windev

    Thanks to its full integration, legendary ease of use, and advanced technology, WINDEV allows you to easily develop large-scale projects in Windows, Linux, .NET, Java, and much more! (Full compatibility with web, mobile, Android, iOS, etc.) WINDEV creates applications for Windows, Linux, and Mac. WEBDEV recompiles them for the Internet. WINDEV Mobile recompiles them for tablets or smartphones. Use the same project, interfaces, objects, elements, and source code regardless of the target. Make the most of your developments, and deploy faster on all devices. The ability to simply recompile an application for different targets is a decisive advantage. It guarantees continuity and the ability to respond to changes. Several automatic features are available. Portable code and objects (for Web browsers and Mobile code). WINDEV supports all the databases that use ODBC drivers or OLEDB providers.
    Starting Price: $1,768 one-time payment
  • 27
    WebSmart

    WebSmart

    Fresche

    WebSmart is a rapid development tool for creating RPG and PHP desktop & mobile web applications. Responsive templates help you quickly create modern applications and APIs that you can customize for any business need using WebSmart’s powerful IDE. Templates generate the initial client and server-side code which you can customize to create any type of web application. Use responsive templates to create web and mobile applications that use a single code base. Use WebSmart’s API templates to quickly and seamlessly integrate your Db2 files and RPG programs with other web services. The PHP Edition helps you produce open source PHP applications that run on multiple platforms (IBM i, Windows, Linux, or Unix). The ILE edition is the fastest way for IBM i programmers to develop new RPG web applications that leverage existing code. Uses PHP, a popular and proven open-source language explicitly developed to create web applications.
  • 28
    Robot Schedule
    Every data center manager wants their IT team to be efficient, meet service-level agreements, and avoid processing errors. Automated job scheduling and batch job management free you and your operators to be more productive. And Robot Schedule is the starting point for any automation project requiring IBM i. Robot Schedule’s workload automation capabilities allow users to automate everything from simple jobs to complex, event-driven processes on multiple platforms and centralize management from your most reliable system, IBM i. Just create a calendar of when and how jobs should run, and the software will do the rest. Your operators have enough tasks on their plates to worry about babysitting scheduled jobs in order to ensure they run on time and in the right order. You and your team can rely on Robot Schedule to provide powerful workload automation for a smoother, error-free job schedule. Choose from more than 25 scheduling parameters.
  • 29
    Powertech Authority Broker for IBM i
    Giving too much system access to the wrong users can lead to catastrophic data corruption and loss. Limit the risk with privileged access management software. Powertech Authority Broker for IBM i protects corporate assets and audits user access in real time for maximum system security. Security best practices recommend limiting the number of privileged user accounts, but having too many user profiles with special authorities is one of the most common security lapses uncovered in IBM i audits. Give users the access they need to do their jobs—without giving too much. Maintain a record of everything a user does when they swap into a privileged profile. Using award-winning screen capture technology, Powertech Authority Broker for IBM i provides system administrators and IT leaders with an unparalleled view of user activity, helping to safeguard sensitive IBM i data.
  • 30
    Powertech Encryption for IBM i
    Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Powertech Encryption allows organizations to encrypt database fields, backups and IFS files quickly and effectively with its intuitive screens and proven technology. Our database encryption software allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential data on IBM i (iSeries, AS/400), as well as data from distributed systems, from both external hackers and unauthorized internal users.
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next