Business Software for OpenText Content Management (Extended ECM)

Top Software that integrates with OpenText Content Management (Extended ECM) as of August 2025

Compare business software, products, and services to find the best solution for your business or organization. Use the filters on the left to drill down by category, pricing, features, organization size, organization type, region, user reviews, integrations, and more. View and sort the products and solutions that match your needs in the results below.

  • 1
    PlanStreet

    PlanStreet

    PlanStreet

    No matter the size of your organization, our software has everything you need to manage and accelerate your performance. Our secure and scalable case management software has the flexibility to support your client’s needs and empower your agency. HIPAA and HITRUST security standard compliance ensure that your sensitive data and files are secure with PlanStreet. It is time to abandon manual forms and processes. Switch to PlanStreet and automate your client engagement, cases, forms, and files. We’re positive PlanStreet will help you and your team(s) plan, execute, and track work. We are confident that our case management software is the tool your health and human services team needs to get to the next level. Please contact us to schedule a free demo and to learn more about our unique approach to case management.
    Starting Price: $100/user/month
  • 2
    Nucleus

    Nucleus

    Nucleus

    Nucleus is redefining the vulnerability management software category as the single source of record for all assets, vulnerabilities, and associated data. We unlock the value you’re not getting from existing tools and place you squarely on the path to program maturity by unifying the people, processes, and technology involved in vulnerability management. With Nucleus, you receive unmatched visibility into your program and a suite of tools with functionality that simply can’t be replicated in any other way. Nucleus is the single shift-left tool that unifies development and security operations. It unlocks the value you’re not getting out of your existing tools and puts you on the path to unifying the people, processes, and technology involved in addressing vulnerabilities and code weaknesses. With Nucleus, you’ll get unmatched pipeline integration, tracking, triage, automation and reporting capabilities and a suite of tools with functionality.
    Starting Price: $10 per user per year
  • 3
    Genymotion

    Genymotion

    Genymobile

    Empower your Android teams with virtual devices that truly scale. With all testing frameworks based on ADB, Appium, Espresso, Robotium, etc. Works with popular continuous integration solutions CircleCI, Bitrise, Terraform, etc. No nested virtualization to speed up your tests and operations with or without a dedicated GPU. Instant access to unlimited virtual devices that can be run simultaneously for test sharding or parallel testing. Available from Android 4.4 to latest Android versions, in all screen sizes and on a large variety of platforms including our own but also AWS, Google, Azure and Alibaba. Control over your infrastructure with no maintenance needs. Best-in-class security and reliability for enterprise needs. Infinite scalability with cloud providers datacenters. Dedicated GPUs are available on selected devices. Emulate 3000+ virtual Android device configurations (Android versions, screen size, hardware capacities, etc.)
    Starting Price: $0.05 per minute
  • 4
    DocsCorp

    DocsCorp

    DocsCorp

    Document management professionals turn to DocsCorp when they are looking for easy-to-use software that empowers them to work safer and smarter. We are a global brand with more than 500,000 users in over 65 countries. Our product portfolio is a list of must-have technologies that include document creation, email recipient checking, metadata cleaning, document comparison, PDF creation, and image file conversion to PDF, which can be accessed on the desktop, server or cloud. Our products integrate out-of-the-box with leading enterprise content management systems to streamline processes and to drive business efficiency. We offer organizations a combination of on-premises and cloud integrations. We work with industries that are document-centric to help them manage their most critical asset - documents. This includes Government Departments, Legal Services, Financial Services, and Technology companies.
    Starting Price: $49.50/user
  • 5
    Objective Redact
    Redaction software for security conscious organizations. Protect yourself and your organization from accidental disclosure. Know that you’ve redacted any confidential word, phrase or number. It’s an awful feeling when, after manually redacting a document, you can’t help but wonder if you’ve got every word. Yes, “find and replace” works, but only to a certain point. Hidden metadata may still be lurking in your document. Protect yourself and your organization from accidental disclosure. Objective Redact is powerful, automated redaction software that makes redaction much faster, internal review much easier, and keeps your most sensitive information safe. It is ideal for compliance and disclosure processes, redaction is easier and faster; and can handle large volumes of and long, complex documents. Permanently remove all text content marked for redaction, including hidden metadata such as authors, creation dates and other attributes that can be stored in a file.
    Starting Price: $76.49 per month
  • 6
    IRI DMaaS

    IRI DMaaS

    IRI, The CoSort Company

    Data may be the most important asset, and risk, that your company holds. It describes customers, products, transaction histories, and everything else that you use and plan in business. This data can be in databases, files, spreadsheets, Hadoop, cloud platforms or apps. If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. To facilitate the service, you can transfer unprotected data to a secure on-premise or cloud-based staging area, or provide remote, supervised access to IRI to the data sources(s) at issue under a strict NDA.
    Starting Price: $1000 per day
  • 7
    InsightCloudSec
    You transform your business, we’ll keep your cloud services secure. InsightCloudSec enables you to drive innovation through continuous security and compliance. Achieve continuous security and compliance and prevent misconfigurations through unified visibility and monitoring and real-time automated remediation. Secure configurations and workloads through automated cloud security and vulnerability management across dynamic cloud environments. Manage identity and effective access across ephemeral resources, at scale. InsightCloudSec is a fully-integrated cloud-native security platform, your whole cloud security toolbox in a single solution. Consumer privacy (or the lack thereof) is a huge societal concern and the focus on protecting privacy is manifesting itself through many forms, including regulations like the California Consumer Privacy Act and General Data Protection Regulation.
    Starting Price: $66,000 per year
  • 8
    SafeGuard Cyber

    SafeGuard Cyber

    SafeGuard Cyber

    SafeGuard Cyber is a SaaS security platform providing cloud-native defense for critical cloud communication applications that organizations are increasingly reliant upon, such as Microsoft Teams, Slack, Zoom, Salesforce, and social media. A blind-spot is growing for security operations as adoption of these tools increases, creating more risk and vulnerability to ransomware, business compromise, and confidential information leakage. Email security lacks the ability to both create visibility outside of email, and primarily defend against malicious files and links. CASB/SASE solutions are difficult to deploy and manage, and the control function is typically left “open” to prevent false positives. Manage day-to-day business communication risk extending beyond email and into enterprise collaboration applications. According to the Verizon DBIR, 92% of social engineering attacks achieve infiltration.
  • 9
    SD Elements

    SD Elements

    Security Compass

    Security Compass, a pioneer in application security, enables organizations to shift left and build secure applications by design, integrated directly with existing DevSecOps tools and workflows. Its flagship product, SD Elements, helps organizations accelerate software time to market and reduce cyber risks by taking an automated, developer-centric approach to threat modeling, secure development, and compliance. Security Compass is the trusted solution provider to leading financial and technology organizations, the U.S. Department of Defense, government agencies, and renowned global brands across multiple industries.
  • 10
    SOCRadar Extended Threat Intelligence
    SOCRadar Extended Threat Intelligence, a natively single platform from its inception that proactively identifies and analyzes cyber threats with contextual and actionable intelligence. Organizations need to have better visibility into external facing assets and services and the related vulnerabilities they may present. It is clearly not sufficient to have only EASM solutions to eliminate cyber risks. Rather, EASM technologies are advised to be a component of a broader enterprise vulnerability management strategy. Enterprises are seeking digital asset protection wherever exposure may occur. The traditional focus on social media and the dark web is insufficient as threat actors proliferate sources. Monitoring capabilities across all environments (cloud buckets, dark web) are considered to equip the security team effectively. For a comprehensive Digital Risk Protection, services like site takedown and automated remediation should also be included.
  • 11
    Lawcadia

    Lawcadia

    Lawcadia

    Lawcadia is an end-to-end legal operations platform for in-house legal teams and law firms. A unique two-sided platform with an intelligent automation engine, Lawcadia transforms the way in-house legal teams and law firms collaborate and solve business problems. In-house legal teams benefit from structured intake and triage, streamlined workflows, accurate instructions, greater control of budgets and law firm engagements, as well as optimised document, email, and matter management. Plus, configurable metrics and dashboards clearly demonstrate the legal function’s value within the organisation. Law firms benefit from enhanced client relationships through client intake portals, improved project management and the creation of bespoke regulatory workflows, supported by exceptional reporting analytics. Utilising Lawcadia Intelligence, an intelligent platform engine, Lawcadia incorporates no-code automation and logic-based workflows with an intuitive end-to-end legal operations plat
  • 12
    Repstor affinity
    It’s all very well having a great content repository, but if teams aren’t using it, the benefits and payback will be limited. Repstor affinity™ cuts straight through this issue, by making Microsoft Outlook the front-end to content management. Because it’s a tool teams use every day, they won’t have to change the way they work. This means they’re 100% more likely to routinely store client and project or caserelated content and correspondence where it can be found instantly – in the central content management repository. Repstor affinity™ is the only truly native integration to MS Outlook offering a seamless user experience on and off-line for email management, document management etc. Filing of emails and content all happens in the background so even if you want to file 100s of project-, case-, or clientrelated emails in one go, users can do this in an instant and continue working while the emails upload to the content system in the background.
  • 13
    IRI CellShield
    IRI CellShield® protects the sensitive information in your Microsoft Excel® spreadsheets, allowing you to comply with data privacy laws. Point-and-click to protect your columns with reversible and non-reversible masking functions. CellShield keeps your data secure, whether it's in one sheet or a million. Use multiple search methods to find and report on PII across the LAN, and protect it all at once. Classify and mask it in intuitive graphical dialogs. CellShield's core technology is built on the award-winning IRI FieldShield data masking product for databases and flat files. Data masked in one platform can be revealed in another. CellShield EE is the only full-featured, professional data discovery, masking, and auditing package for Excel 2010, 2013, 2016, and 2019 (plus Office 365) workbooks in your LAN. CellShield EE exceeds the security and scope of a single password by combining and automating all these extra capabilities.
    Starting Price: $35 one-time payment
  • 14
    Rapid7 InsightConnect
    InsightConnect is Rapid7’s security orchestration, automation and response (SOAR) solution, with which you can accelerate your time-intensive, highly manual incident response and vulnerability management processes. Connect teams across your IT and security systems with clear communication, collaboration, and integration. Streamline your manual, repetitive tasks with connect-and-go workflows, no code necessary. Supercharge your security operations with automation that drives efficiency, without sacrificing analyst control. Streamline and accelerate highly manual, time-intensive, processes 24 hours a day. With more than 300 plugins to connect your IT and security systems, and a library of customizable workflows, you’ll free up your security team to tackle bigger challenges, while still leveraging their expertise. Incident response can be time consuming. If you’re suffering from alert fatigue, you understand.
  • 15
    Rev-Trac

    Rev-Trac

    Rev-Trac

    Rev-Trac is the SAP DevOps orchestration platform. The solution Automates native SAP transports and Cloud changes, while the 3rd party integrations and highly flexible workflows allow any organisation to build a unified SAP DevOps strategy for complex SAP landscapes. Rev-Trac is an SAP DevOps platform that allows you to safely deploy faster and more frequent SAP applications and updates, maximizing business value on your technology investments. Outcomes: -Confidently achieve agile, SAP DevOps & continuous delivery objectives - React quickly to changes in business demand - Quicker return on investment - Keep your business safe – less unscheduled downtime - Automation dramatically reduces costs - Eliminating manual activities enables more efficient workflows, releasing the team to focus innovation and activities that drive profits - Reduce effort to deliver rapid, low-cost, and high-quality SAP change - To enhance the volume, velocity and quality of SAP change
  • 16
    OpenText Content Aviator
    OpenText Content Aviator is an advanced AI-powered content management solution that revolutionizes how organizations interact with and manage their enterprise content. Built on generative AI and Large Language Models (LLMs), Content Aviator allows users to engage with vast amounts of unstructured data, such as documents, emails, and reports, using natural language queries. Instead of manually searching through files, users can ask questions in plain language and receive precise, context-aware responses, making content discovery faster and more intuitive. This tool enhances productivity and decision-making by quickly surfacing relevant information, summarizing lengthy documents, and providing actionable insights from across an organization’s content ecosystem. Integrated seamlessly with OpenText's content management systems, Content Aviator works within secure and compliant frameworks, ensuring sensitive information remains protected.
  • 17
    SOAtest

    SOAtest

    Parasoft

    Anchored in artificial intelligence (AI) and machine learning (ML), Parasoft SOAtest simplifies the complexity of functional testing across APIs, UIs, databases, and more. Change management systems continuously monitor quality, making the API and web service testing tool a perfect fit for Agile DevOps environments. Parasoft SOAtest delivers fully integrated API and web service testing tools that automate end-to-end functional API testing. Streamline automated testing with advanced functional test-creation capabilities for applications with multiple interfaces (REST & SOAP APIs, microservices, databases, and more). The tools reduce the risk of security breaches and performance outages by transforming functional testing artifacts into security and load equivalents. Such reuse, along with continuous monitoring of API for change, allows faster and more efficient testing.
  • 18
    PassiveTotal
    RiskIQ PassiveTotal aggregates data from the whole internet, absorbing intelligence to identify threats and attacker infrastructure, and leverages machine learning to scale threat hunting and response. With PassiveTotal, you get context on who is attacking you, their tools and systems, and indicators of compromise outside the firewall—enterprise and third party. Investigation can go fast, really fast. Find answers quickly with over 4,000 OSINT articles and artifacts. Along with 10+ years of mapping the internet, RiskIQ has the deepest and broadest security intelligence on earth. By absorbing web data like Passive DNS, WHOIS, SSL, hosts and host pairs, cookies, exposed services, ports, components, and code. With curated OSINT and proprietary security intelligence, you can see everything—from every angle—on the digital attack surface. Take charge of your digital presence and combat threats to your organization.
  • 19
    Airlock

    Airlock

    Airlock

    Airlock's Secure Access Hub protects applications, APIs and data from identity theft and the most common attacks on Web applications. Security meets convenience, Airlock offers your customers a customer journey without media breaks with single sign-on, social registration, comprehensive user self-services and consent management. Acting in line with the market means reacting quickly. The Airlock Secure Access Hub therefore provides all important security functions such as registration, authentication and self services. So you can concentrate all your IT resources on your business processes. The Airlock Secure Access Hub helps to meet all international compliance standards - from GDPR over PSD2, PCI-DSS, OWASP to MAS. The upstream enforcement point for access policies onto applications and services allows compliance with regulations without having to make adjustments in each individual application.
  • 20
    EndaceProbe
    EndaceProbes record 100% accurate Network History to solve Cybersecurity, Network and Application issues. Bring clarity to every incident, alert or issue with an open packet capture platform that integrates with all your commercial, open source or custom-built tools. See exactly what’s happening on the network so you can investigate and defend against even the toughest Security Threats. Capture vital network evidence, so you can quickly resolve Network and Application Performance issues or outages. The open EndaceProbe Platform brings tools, teams and workflows together into an integrated Ecosystem. Network History available at your fingertips from all your tools. Built into existing workflows so teams don’t have to learn more tools. A powerful open platform to deploy your favorite security or monitoring tools on. Record weeks or months of rapidly searchable, accurate network history across your entire network.
  • 21
    Intellicta

    Intellicta

    TechDemocracy

    Intellicta, TechDemocracy’s brain child, is the first of its kind to deliver a holistic assessment of an entity’s cybersecurity, compliance, risk and governance. It is a singular product capable of predicting potential financial liabilities caused by threats posed by vulnerabilities in cyberspace. Intellicta empowers senior, non-technical business decision-makers to understand, evaluate and measure the effectiveness of their existing cybersecurity, governance, risk, and compliance programs. The platform can be customized to meet every company's unique business requirement. It leverages quantifiable metrics based on established models from ISM3, NIST, and ISO, among others to provide solutions. Intellicta boasts of open-source architecture that aggregates and analyzes every facet of an enterprise’s unique ecosystem, so that it can be integrated and monitored continuously. It can extract critical data from cloud-based, on-premises and third-party systems.
  • 22
    Precisely Ironstream
    Integrate mainframe and IBM i systems into leading IT analytics and operations platforms for an enterprise-wide view to support your digital business. In today’s digital, always-on world, IT is arguably the most important department across your organization. A single security breach or service outage can bring your business to a standstill. But knowing what’s happening across an increasingly complex landscape of infrastructure and apps, and resolving issues before they impact the business, is a daunting task. The good news is that there are several platforms to help you monitor IT security and operations across the enterprise in real-time, and take action fast. The challenge, however, is that mainframe or IBM i systems aren’t natively supported by these modern tools. So, if you rely on these critical servers to run your business and you’re managing them in isolation, you have a dangerous blind spot.
  • 23
    Optiv Managed XDR
    Attackers are stealthy, relentless and motivated, and might use the same tools you do. They hide in your environment and quickly expand access. We understand the cyber ecosystem because it’s where we live, it’s where we operate. Our MXDR solution’s secret sauce derives from that pedigree, tested processes, proven IP, best-of-breed technology, leveraged automation and providing top-shelf talent to manage it all. Let’s collaborate and develop a custom solution with comprehensive threat visibility, accelerated incident identification, investigation, triage and mitigation actions to protect your enterprise from attacks and threats. We’ll start with your existing investments in endpoint, network, cloud, email and OT/IoT tools. Our experts will get those on the same team, actual technology orchestration! Reduces the attack surface, detects threats faster and automates deep investigation through a continuous approach.
  • 24
    Quantum VS-NVR Series
    Quantum offers a broad portfolio of network video recording servers to meet the needs of any surveillance environment, from a few cameras to hundreds of cameras. Each product is designed with the latest hardware to achieve the best performance at the best price, and to maximize the useful life of the products. The VS-NVR series is available in a variety of form factors, including mini-tower, 1U rack mount, 2U rack mount, and an ultra-dense 4U 60-bay rack mount server for recording and retaining footage from hundreds of cameras for months or years. Every product is backed by Quantum’s global support organization, providing installation and support 24/7/365 to tens of thousands of customers around the world. Designed with the latest hardware and operating systems to maximize the number of cameras each product can support. Each VS-NVR product was designed and specified to achieve the best performance at the lowest cost.
  • 25
    EzeScan

    EzeScan

    EzeScan

    The EzeScan Application and Survey Forms Data Extraction solution can automate your forms capture and reduce the amount of manual data entry, and where possible eliminate it all together. EzeScan provides a speedy interface to automate the extraction and verification of document data. The exception workflow interface provides for mandatory field requirements to guarantee clean output data that can be set to output in several file formats or uploaded into many common databases. For the records professional EzeScan takes the hard work out of capturing your valuable information, accurately and efficiently. As a batch capture tool, EzeScan can help you capture large volumes of paper based, digital born documents and corporate email. For both hard copy capture from an MFD or registering digital born documents; with EzeScan your staff can automatically capture and save their documents from any location directly into your line of business processes.
  • 26
    Planview Viz
    Planview Viz (formerly Tasktop Viz) is a value stream management analytics platform designed to help organizations improve efficiency and accelerate time-to-market by providing visibility into software delivery processes. With advanced features that identify bottlenecks, address dependencies, and measure value streams, Planview Viz enables IT, business, and transformation leaders to optimize their workflows, improve predictability, and align technology efforts with business outcomes. By offering actionable insights into development processes, Planview Viz helps organizations streamline operations, enhance collaboration between business and tech teams, and achieve higher ROI on transformation initiatives.
  • 27
    CloudBeat

    CloudBeat

    CloudBeat

    Create, run and analyze tests without any hassle. Empowering dev, testing, product and DevOps teams to release a superior quality product in the shortest time possible. Utilize your tests in production. Monitor business transactions. DevOps & developer-friendly, cross-region, device, and browser. Monitor user experience & SLA, detailed performance breakdown. Smart root-cause analysis, instant alerts & daily reports, SaaS or on-premise. CloudBeat is a centralized continuous quality platform that helps create, execute and analyze unit, API, integration and end-to-end tests in a DevOps environment. CloudBeat seamlessly integrates with the most popular testing frameworks and CI tools, allowing to run large test sets with out-of-the-box parallelization, test lab management, and failure root cause analysis. Our mission is to help you to increase your software quality, reduce testing and development time and eventually improve your customer satisfaction.
  • 28
    BeyondTrust Cloud Privilege Broker
    Cloud Privilege Broker gives your team the tools to visualize and manage entitlements across the multi-cloud infrastructure. Cloud-agnostic, centralized dashboard with key metrics. Continuous discovery of users, roles, policies, and endpoints across all supported cloud platforms. Granular policy recommendations across IaaS and PaaS platforms from a single interface. BeyondTrust Cloud Privilege Broker (CPB) is an entitlements and permissions management solution that enables customers to visualize and manage cloud access risk in hybrid and multi-cloud environments, all from a single interface. Each cloud service provider has its own access management tools, but they only manage their own environments and do not scale to cover others. This leaves teams to swivel from console to console, attempting to manage permissions separately for each cloud provider, with different ways to apply policy from one platform to the next.
  • 29
    BlueSwan

    BlueSwan

    Cigniti

    Organizations need to transform their business models to keep riding the digital wave. However, to become digital, they need to adopt quality engineering services. Powered by intelligence and automation, architected with customer experience at its center, and built for the agile and DevOps environment, quality engineering services leverage deep domain expertise to customize solutions according to the industry and are focused on achieving quality speed. Helps accelerate quality engineering for digital enterprises globally by solving their test engineering problems as they try to align with the needs of digital transformation. Assures impeccable software quality and helps clients deliver applications that are truly reliable, robust, scalable, and highly secure. Fortifies our IP-led quality engineering and software testing services and domain-centric approach to offering world-class digital transformation to businesses across different verticals.
  • 30
    ActiveControl
    Increase business agility and competitiveness with faster, safer, more frequent delivery of SAP change. Today’s industry leaders need the power of innovation to beat the competition and adapt to rapidly-changing markets. But innovating fast can be a challenge for companies who run complex SAP environments where rapid, low-risk change isn’t easy. ActiveControl’s advanced automation solves that problem with a fundamentally new approach to change and release that enables companies to adopt agile development, DevOps, and continuous delivery in SAP. Customizable workflows let you automatically deploy SAP transports (and even non-SAP changes) after relevant approvals. Whether you define system-specific import schedules or adopt a continuous delivery model, change deployments and dependent manual activities are automatically orchestrated across all your SAP systems. For maximum DevOps value SAP systems should be part of your global IT landscape and best-practice delivery processes.
  • Previous
  • You're on page 1
  • 2
  • Next