Business Software for IBM i - Page 3

Top Software that integrates with IBM i as of July 2025 - Page 3

IBM i Clear Filters
  • 1
    Assure QuickEDD
    Protect critical IBM i applications from downtime and guard against data loss with simple, scalable, full-featured available and disaster recovery products. Assure QuickEDD replicates IBM i data and objects in real-time to local or remote backup servers. These servers then stand ready to assume the production role or recover data, including data from past points in time. Assure Quick EDD is expandable to multiple nodes and supports multiple replication topologies. It can also be used with a variety of IBM i OS levels and storage combinations and is scalable from SMB to enterprise workloads. The service uses a graphical interface that supports seven languages and a 5250 interface, with customizable switch procedures that can run step-by-step, interactively or in batch mode. Tools are provided for analysis, monitoring, and specific configurations, and reports can be created on your HA environment, job logs, and more. Alerts are also available through email, MSGQ, and SNMP.
  • 2
    HuLoop

    HuLoop

    HuLoop

    Get data-driven recommendations on your people, processes, and technologies. Set up automation of complex business processes, across disparate systems and data. Automate repetitive tasks to perform testing that is difficult to do manually. HuLoop platform creates, deploys, and manages intelligent agents as a digital workforce to perform repetitive tasks your people should no longer do. HuLoop digital agents can help you lower costs, improve productivity, and increase the job satisfaction of people across your organization. Helps you see, understand, and change your capabilities, as well as understand how your people, processes, and technologies interact. Automation and orchestration of complex business processes, across disparate systems and data, minimizing human dependency. Controls and executes tests and verifies expected outcomes. Automates repetitive tasks and performs testing that is difficult to do manually.
  • 3
    Rocket DevOps

    Rocket DevOps

    Rocket Software

    Our DevOps tools enable true end-to-end (CI/CD) for IBM i+ environments. Businesses can extend holistic DevSecOps best practices to the IBM i, pursue innovative experimentation, easily respond to compliance audits, and adapt to the ever-changing expectations of process, technology, or experience. In the face of changing regulations and the increasing threat landscape, Rocket DevOps, is part of Rocket’s Security & Compliance solutions designed to de-risk your modernization through the most robust technology, expertise, services, and support. And, with the unmatched experience of our DevOps services team, you’ll be set up for success quickly, with a customized implementation that works best for your business and the power to take ownership over any future changes. Businesses must respond to customer and market needs regardless of how their IT infrastructures are set up. Customers expect development and IT teams to deliver the applications and environments that help businesses excel.
  • 4
    Rocket iCluster

    Rocket iCluster

    Rocket Software

    Rocket iCluster high availability/disaster recovery (HA/DR) solutions ensure uninterrupted operation for your IBM i applications, providing continuous access by monitoring, identifying, and self-correcting replication problems. iCluster’s multiple-cluster administration console monitors events in real-time on the classic green screen and the modern web UI. Rocket iCluster reduces downtime related to unexpected IBM i system interruptions with real-time, fault-tolerant, object-level replication. In the event of an outage, you can bring a “warm” mirror of a clustered IBM i system into service within minutes. iCluster disaster recovery software ensures a high-availability environment by giving business applications concurrent access to both master and replicated data. This setup allows you to offload critical business tasks such as running reports and queries as well as ETL, EDI, and web tasks from your secondary system without affecting primary system performance.
  • 5
    mPower Cloud Migration Factory

    mPower Cloud Migration Factory

    Meridian Group International

    Meridian's mPower Cloud Migration Factory is a comprehensive solution that helps businesses of all sizes migrate their workloads to the cloud quickly, securely, and cost-effectively. Our proven methodology minimizes downtime and disruption to your business and ensures the successful migration of workloads to the cloud. Migrating to the cloud can help you to reduce your IT costs in a number of ways, such as eliminating the need to purchase and maintain hardware and software, and scaling your resources up or down as needed. The cloud gives you the agility to quickly deploy new applications and services, and to easily scale your resources up or down to meet changing demands. The cloud offers a number of security features that can help to protect your data from unauthorized access and use, such as data encryption, intrusion detection, and access control. Meridian's mPower Cloud Migration Factory offers a variety of features to help you migrate your workloads to the cloud.
  • 6
    mProtect Platinum

    mProtect Platinum

    Meridian Group International

    mProtect Platinum is an enterprise-grade data protection solution that offers comprehensive features and premium support. It is designed to help you protect your data from all types of threats and ensure that your business can recover from any disaster. mProtect Platinum protects all of your critical assets, including physical and virtual servers, databases, applications, and endpoints. You can choose to back up your data on-premises, in the cloud, or both. Meridian's team of experts will proactively monitor your data protection environment for potential problems and take steps to resolve them before they cause any disruption to your business. mProtect Platinum allows you to schedule automatic backups for your data, which can save you time and effort. You can also schedule incremental backups to reduce the amount of data that needs to be backed up each time.
  • 7
    DROPS

    DROPS

    DROPS

    DROPS is a release management tool designed to simplify, secure, and centralize the deployment of applications across data centers, hybrid, and multi-cloud infrastructures. It supports a wide range of platforms, integrates seamlessly with various CI/CD pipelines, and offers both agent-based and agentless operations. With features like full-stack release management, automated infrastructure provisioning, and 24/7 availability, DROPS aims to streamline deployment processes and ensure consistent, reliable delivery. The tool is flexible enough to manage both legacy and modern applications, catering to diverse enterprise needs. Select agent-based or agentless operation. No need for agent installation and management. DROPS adapts to your configuration and if agents are needed, they are provisioned automatically. Plan and organize your application deployment from the web console with no scripting needed. Ease collaboration between stakeholders and technical teams.
  • 8
    Sysgem Logfile Concentrator
    Sysgem's Logfile Concentrator is a comprehensive Windows-based tool designed to integrate streams of log file data from multiple sources into a single centralized location. It collects log data from remote multi-platform servers and end devices, storing them in a central database for analysis and regulatory-compliant archiving. Key features include automated archiving and reporting, customizable record displays, advanced querying, audit trail, and compliance management, as well as intelligent alarms and real-time alerts. The platform offers a user-customizable display for real-time record monitoring and provides a full web browser interface for remote access. Additionally, it supports common ODBC databases such as MS SQL, Oracle, and MS Access. As part of the Sysgem product family, Logfile Concentrator can function as a standalone solution or complement the Sysgem Enterprise Manager (SEM).
  • 9
    Performance Navigator
    Performance Navigator is a graphical PC tool designed for performance analysis and capacity modeling across various platforms, including IBM i, AIX/VIOS, Linux, Solaris, and HP-UX workloads on IBM Power Systems, Oracle, and HP servers. It collects historical performance data with minimal overhead by securely feeding data from collection services, NMON, and/or SAR to the Windows client nightly, updating system history files. The software offers thousands of graphs, custom reports, and features to assist with performance analysis, server consolidation, and upgrades. Its "What If" functionality allows users to model hypothetical scenarios to determine how capacity changes will impact server performance, facilitating precise capacity planning decisions. Additionally, Performance Navigator provides swift problem determination, enabling users to obtain comprehensive summaries of system issues in under two minutes. It supports various platforms.
  • 10
    Wintouch CRM

    Wintouch CRM

    Touchtone

    Each of our software products were first introduced more than 25 years ago for IBM i (iSeries & AS/400) systems! Over the years our software has grown to meet the demands of the advancing business & technology environment while maintaining support for those legacy systems. Today, our software provides you with several options to extend the life of your legacy systems and smoothly transition to the cloud when you’re ready. Wintouch CRM is a business management solution available as a highly customizable cloud service. It is designed to help businesses and organizations of all sizes improve productivity in marketing, sales, customer service, project management, administration, and more. Since it’s launch in 1995 Wintouch has matured into a feature-rich business management tool that adapts to the specific needs of your organization. Wintouch is the best CRM for organizations running their business on the AS400 systems because it provides you with several future-proofing options.
  • 11
    iSecurity Firewall

    iSecurity Firewall

    Raz-Lee Security

    iSecurity Firewall is a comprehensive, all-inclusive intrusion prevention system that secures every type of internal and external access to the IBM i server. It enables you to easily detect remote network accesses and, most importantly, implement real-time alerts. Firewall manages user profile status, secures entry via pre-defined entry points and IBM i file server exit points, and profiles activity by time. Its “top-down” functional design and intuitive logic creates a work environment that even iSeries novices can master in minutes. Protects all communication protocols (including SQL, ODBC, FTP, Telnet, SSH, and Pass-through). Intrusion Prevention System (IPS) with real-time detection of access attempts. Precisely controls what actions users may perform after access is granted – unlike standard firewall products. Protects both native and IFS objects – all of your databases are secured.
  • 12
    Rocket Terminal Emulator
    Rocket® Terminal Emulator (formerly Rocket® BlueZone®) is a different kind of solution. Highly configurable, users can customize their environment to maximize comfort and efficiency. Its native security ensures your critical business data remains protected, while providing a cost-effective alternative that delivers exceptional value. Switching from your existing terminal emulation solution is straightforward with our migration wizards and exceptional team supporting your move to Rocket Terminal Emulator. Rocket Terminal Emulator enables each user to customize their terminal environment to feel familiar and comfortable. Users of host systems often have shortcuts and hot-keys configured specifically to their most often-used tasks. With Rocket Terminal Emulator, many of those macros will easily migrate from your prior emulator.
  • 13
    C&W Business DRaaS
    Most Disaster Recovery as a Service products enable companies to restore critical business functions during failures in their information technology solutions. Not C&W’s. Much more than enabling clients to simply restore their technological infrastructure, C&W has developed a series of INTEGRATED SOLUTIONS that enable clients to automate and orchestrate all of their production environments in combination with their disaster recovery. With C&W’s solutions, all the repetitive activities, monitoring, alarms, DR tests, and much more can be programmed to execute automatically, on specific dates, and/or on command with a click of a mouse button. In addition, because we understand our enterprise clients’ needs, we have integrated the MOST VARIED PLATFORMS: It doesn’t matter if your company is running on Windows, Linux, AIX, IBM i (formerly AS400), or Solaris, we have a solution for you. Same with virtually any hypervisor.
  • 14
    Powertech Policy Minder
    Powertech Policy Minder for IBM i is a security administration tool that automates critical tasks and provides comprehensive security compliance reporting. By automating security administration, Policy Minder saves time and eliminates labor-intensive manual tasks usually required to administer the details of security. Policy Minder for IBM i features a graphical user interface (GUI) in addition to the traditional green screen. Policy Minder provides an easy way to define your security policy on IBM i, whether you want to customize a security policy based on your organization's unique requirements or use a template based on cybersecurity best practices. Comparing your security policy to your system's current configuration is simple and automated. You can even schedule your policy checks so that they run automatically. The FixIt function automatically finds settings that are out of compliance and fixes them.
  • 15
    iSecurity Anti-Ransomware
    Advanced Ransomware Threat Protection for IFS. Anti-Ransomware iSecurity Anti-Ransomware protects against ransomware attacks and other kinds of malware that may access and change IBM i data on the IFS. It prevents ransomware from damaging valuable data while preserving performance. Today’s IBM i is no longer an isolated system. It is connected to other databases through networked systems and connectivity. Businesses are encouraged to open up their IBM i servers and to use APIs, microservices, and modern user interfaces to leverage the data and business processes they contain. The data stored on the IFS is like any other file that the mapped PC can access. Ransomware attacks any file it can access including connected devices, mapped network drivers, shared local networks, and cloud storage services that are mapped to the infected computer. Ransomware doesn’t discriminate. It encrypts every data file that it has access to, including the IFS files.
  • 16
    Precisely Connect
    Integrate data seamlessly from legacy systems into next-gen cloud and data platforms with one solution. Connect helps you take control of your data from mainframe to cloud. Integrate data through batch and real-time ingestion for advanced analytics, comprehensive machine learning and seamless data migration. Connect leverages the expertise Precisely has built over decades as a leader in mainframe sort and IBM i data availability and security to lead the industry in accessing and integrating complex data. Access to all your enterprise data for the most critical business projects is ensured by support for a wide range of sources and targets for all your ELT and CDC needs.