Compare the Top IT Management Software that integrates with IBM i as of April 2026

This a list of IT Management software that integrates with IBM i. Use the filters on the left to add additional filters for products that have integrations with IBM i. View the products that work with IBM i in the table below.

What is IT Management Software for IBM i?

IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making. Compare and read user reviews of the best IT Management software for IBM i currently available using the table below. This list is updated regularly.

  • 1
    Storagepipe

    Storagepipe

    Storagepipe

    Storagepipe provides world-class Cloud and Data Protection Services for companies of all sizes. We specialize in robust and secure Managed Private Cloud, Public Cloud, Cybersecurity, and Disaster Recovery services that are all supported by our first-class in-house technical team. We deliver outstanding value and service, using state-of-the-art technology including Veeam, VMWare, and Microsoft 365 as well as proprietary solutions for specialized platforms like IBM iSeries. Storagepipe is driven to be your trusted partner and our customers trust us with the protection and high availability of their mission-critical systems. Our focus is on a Storagepipe Experience that meets the reliability, scalability and support that your business demands.
  • 2
    Connectria

    Connectria

    Connectria

    Connectria provides TRiA Cloud Management which is a comprehensive cloud governance to optimize spending, manage performance, and ensure continuous security & compliance. It’s the only Cloud Management Platform (CMP) that allows you to manage multiple clouds – from legacy IBM i environments through x86 – into today’s hyper-scale AWS, Azure and GCP clouds – under a single dashboard-driven platform. There isn’t another CMP in the market that is as robust as the TRiA Cloud Management Platform. Optimize visibility, and cloud spending, and manage compliance and security. We combine strategy, migration, managed services, and modernization capabilities to deliver holistic solutions for complex infrastructure challenges. Whether you need to migrate legacy systems out of the data center, adopt cloud-native technologies, or shift IT resources from administrative to strategic initiatives, we’ll be there every step of the way to help you connect the dots between where you are today.
    Starting Price: $199 per month
  • 3
    TestBench for IBM i

    TestBench for IBM i

    Original Software

    Testing and test data management for IBM i, IBM iSeries, AS/400. Complex IBM i applications must be checked from top to bottom, right into the data, wherever it is. TestBench IBM i is a comprehensive, proven test data management, verification and unit testing solution that integrates with other solutions for total application quality. Stop copying the entire live database and hone in on the data you really need. Select or sample data with full referential integrity preserved. Simply decide which fields need to be protected and use a variety of obfuscation methods to protect your data. Track every insert, update and delete including intervening data states. Create rules so that data failures are flagged to you automatically. Avoid the painful save/restores and stop attempting to explain bad test results based on poor initial data. Comparing outputs is a well proven method to verify your test results but it can be laborious and prone to error. This unique solution can save hours.
    Starting Price: $1,200 per user per year
  • 4
    Automate Schedule
    Powerful workload automation for centralized Linux job scheduling. When you’re able to automate all your workflows across your Windows, UNIX, Linux, and IBM i systems with a job scheduler, your IT team has more time to tackle more strategic projects that impact the bottom line. Bring isolated job schedules from cron or Windows Task Scheduler enterprise-wide. When your job scheduler integrates with your other key software applications, it’s easier to see the whole picture, leverage data across the organization, and unify your job schedules. Be more efficient so you can meet your workload automation goals. Automated job scheduling makes your life easier and transforms the way you do business. Build dynamic, event-driven job schedules across servers and take dependencies into account—supporting your business goals with better workflows. Automate Schedule offers high availability for a master server and a standby server so if an outage were to occur, important tasks would continue.
  • 5
    IBM Db2
    IBM Db2 is a family of data management products, including the Db2 relational database. The products feature AI-powered capabilities to help you modernize the management of both structured and unstructured data across on-premises and multicloud environments. By helping to make your data simple and accessible, the Db2 family positions your business to pursue the value of AI. Most of the Db2 family is available on the IBM Cloud Pak® for Data platform, either as an add-on or an included data source service, making virtually all of your data available across hybrid or multicloud environments to fuel your AI applications. Easily converge your transactional data stores and rapidly derive insights through universal, intelligent querying of data across disparate sources. Cut costs with the multimodel capability that eliminates the need for data replication and migration. Enhance agility by running Db2 on any cloud vendor.
  • 6
    iSecurity Audit

    iSecurity Audit

    Raz-Lee Security

    iSecurity Audit enhances native IBM i auditing by monitoring and reporting on all activities in the IBM i environment. It employs real-time detection to identify security events as they occur and record details in a log file. Audit logs can be displayed in simple, graphical formats with accompanying explanations for each entry to aid quick interpretation of statistical information. More importantly, real-time detection triggers alerts and/or takes immediate corrective action. iSecurity Audit is the only security auditing product available for the IBM i that is designed from the ground up for ease-of-use by non-technical personnel such as outside auditors and managers. Audit is a cutting-edge security auditing application that examines events in real time, and triggers alerts and other responsive actions to potential threats. It contains a powerful report generator with over one hundred pre-fabricated built-in reports.
  • 7
    Robot Monitor
    Robot Monitor is the most comprehensive, in-depth monitoring solution available for Power Systems environments running IBM i alone or alongside VIOS, AIX, or Linux on Power. Industry-leading technology gives you the highest degree of monitoring for your critical IT infrastructure. By monitoring the performance of your Power servers in real time—including system status, disk, network, availability, application data, and JDBC/ODBC activity—you and your team can proactively respond to issues before they impact user productivity or resources. Highly customizable, modern dashboards provide visibility into all your metrics, elements, and status conditions so you don’t miss a thing. See all your data from a single, central interface to avoid downtime and optimize performance. Not watching the dashboard? Robot Monitor can send out notification when things go wrong.
  • 8
    IBM i Server Suites
    Pressured to maintain constant system availability in fast-paced business environments, IT teams must do more with less. IBM i server monitoring software saves time and resources by automating monitoring and corrective actions that would otherwise be performed manually. A single download and simple implementation makes it easy to install your solution across the enterprise. Once you’re up and running, enjoy intuitive features, automatic upgrades, and built-in templates. Pick and choose the modules you actually need. Our tiered solution suites progress from entry-level monitoring to advanced operations management. As your business grows, it’s easy to add functionality to meet monitoring, automation, and reporting requirements. Simplify your monitoring of multiple servers and applications with at-a-glance management—anytime, anywhere.
  • 9
    Ricoh

    Ricoh

    Ricoh

    Accelerate growth with scalable public, private, and hybrid cloud solutions. Cloud computing frees you to focus on your core business goals. You get the technology, tools, and apps you need – without traditional infrastructure limitations and necessary ongoing maintenance costs. When you choose the public cloud, you choose high-performance, secure, and cost-effective business tools that don’t require in-house infrastructure or staff to setup. For many companies, the minimal start-up costs and pay-as-you-go fees make the public cloud an attractive way to get started. Initial assessment. Strategic planning for the optimal cloud solution. Build and deployment. Security management of all users to ensure functionality, compliance, and disaster recovery process implementation. Post-setup support. Proactive scanning, monitoring, and reporting to ensure optimal use and maximum data security.
  • 10
    OpenText Exceed
    OpenText™ Exceed™ is a Windows remote access solution for graphically demanding Linux and UNIX software solutions, such as CAD and CAM. Exceed integrates Windows desktop with UNIX, Linux, VMS, X Window System and IBM iSeries and z/OS system environments. A secure, high-performance X Window server, Exceed offers secure and reliable access to X Window applications from Microsoft Windows and Citrix virtual desktops over the LAN. Many engineering, architectural and product design software solutions are implemented on Linux and UNIX, using Linux X Window (X11) graphics technology. A Windows X Server runs these graphical UNIX and X11 applications on Microsoft Windows, rather than costly high-end graphical Linux and UNIX workstations. In order to access the graphically demanding software from Windows, organizations require high performance remote access LAN to LAN software.
  • 11
    Robot Schedule
    Every data center manager wants their IT team to be efficient, meet service-level agreements, and avoid processing errors. Automated job scheduling and batch job management free you and your operators to be more productive. And Robot Schedule is the starting point for any automation project requiring IBM i. Robot Schedule’s workload automation capabilities allow users to automate everything from simple jobs to complex, event-driven processes on multiple platforms and centralize management from your most reliable system, IBM i. Just create a calendar of when and how jobs should run, and the software will do the rest. Your operators have enough tasks on their plates to worry about babysitting scheduled jobs in order to ensure they run on time and in the right order. You and your team can rely on Robot Schedule to provide powerful workload automation for a smoother, error-free job schedule. Choose from more than 25 scheduling parameters.
  • 12
    Powertech Password Self Help for IBM i
    Enabling users to reset their own IBM i passwords immediately removes productivity bottlenecks for both users and the IT support technicians who would typically have to process the request. When users don’t have to file a help desk ticket for password resets, IT can spend their time addressing more critical issues. With password resets accounting for up to 50 percent of help desk calls, productivity gains add up quickly. Guarantee the authenticity of users and prevent fraudulent reset requests by asking a series of challenge questions that must be answered correctly before a reset will be approved. Configure settings to meet security policy requirements. Set rules for the minimum number of password characters, whether repetition of characters is allowed, and whether answers must be case-sensitive.
  • 13
    Powertech Database Monitor for IBM i
    With real-time visibility into every change users make across all systems, security administrators can virtually eliminate the risk of undetected data corruption. See what users are changing across systems. By combining data from multiple, connected systems, you have a centralized view for reporting and archiving, making database security management easier. Maintain an audit trail of all system changes made in a secure database that helps you meet the requirements of some of the most stringent security regulations. Use filters to monitor and record changes to only your sensitive data. Define which fields contain data to be monitored and set the criteria for triggering a notification. Both powerful and easy-to-use, Powertech Database Monitor for IBM i automatically monitors user activity in real time on your IBM i databases. The ability to process events by exception helps you reduce manual database security and file integrity monitoring in order to streamline workflows.
  • 14
    Robot Console
    Inattention to IBM i messages and events can result in backlogs of website orders, inventory updates, or account transactions—which is never good. Robot Console automatically searches message queues for anything that could impact system or application performance. When something goes wrong, Robot Console can automatically fix the issue or escalate it, so you can manage by exception. This robust message management software enables you to work more efficiently and have time back in your day to do what matters. Real availability monitoring goes beyond the QSYSOPR message queue. Ensure that your business users have the access they need to the system resources and applications they rely on every day. Robot Console monitors system resources like lines, ports, and subsystems and system logs like QHST, QAUDJRN, or FTP requests at regular intervals. If it detects a problem, Robot Console can automatically take action, resulting in more uptime so business can run smoothly.
  • 15
    Robot HA

    Robot HA

    Fortra

    When an emergency or disaster strikes, role swap to your on-premise or cloud backup server so your business can continue within minutes. Use your secondary system to perform nightly backups, queries, and planned maintenance activities without impacting your production system. Replicate all of production or only select libraries and programs. Your data is available on your target server instantly. Using remote journaling and a high-speed apply routine, Robot HA can replicate 188 million journal transactions per hour across any distance—physical or virtual—and apply the data the moment it is received, which means that your hot backup is always a real-time copy of production. Get peace of mind by confirming that you are ready to role swap at any moment. Manually trigger a role swap audit as needed or set it up to run at regular intervals. You can configure the audit to examine the objects that are most important to your data center.
  • 16
    Robot Save
    Manage backups from a centralized control center - easily manage backup scheduling, share volumes in and inventory volumes across multiple instances of IBM i. Whether a single object or the entire system needs to be restored, bring back IBM i data accurately and efficiently, with minimal downtime. Take the backbreaking manual labor out of your data backups with trusted backup management software. Safe, reliable, thorough, and automated backups can be run unattended, saving you time. Don’t be caught by surprise when auditors need a documented disaster recovery plan— with this backup reporting software, you’ll have it at your fingertips, ready to go. Data backups can be complex. From determining what to save and locating files to tracking saved items and managing save media after the backup, Robot Save automates all of the processes required to perform a complete backup. The end result? Scheduled backups you can rely on.
  • 17
    TD/OMS

    TD/OMS

    Remain Software

    TD/OMS supports IBM i (Power) Windows and Unix/Linux. It incorporates fundamental IT business process support to manage software changes, software development, deployment and modernization projects. TD/OMS enables development teams to work in a collaborative way and to share any information at various development stages in any environment (Development, Test, Acceptance, and Deployment). TD/OMS is a powerful software solution that incorporates all the functionalities to support modern software development requirements.
  • 18
    VL OMNI

    VL OMNI

    VL OMNI

    Top global multichannel businesses trust VL OMNI to guide their eCommerce and ERP integrations and move data seamlessly through their infrastructure as they grow and accelerate their business. Through our managed service, VL OMNI provides strategic consultation to scaling brands, helping them integrate their applications with their complex business rules in mind. Handle high-volume data movements with ease. Our scalable and elastic integrations are agile to change and adapt to your business — not the other way around. Apply business rules directly to data transformations. Our integration connectors can be configured based on your business needs. Move data from point to multipoint and bidirectional in ways that are meaningful to your business. Aggregate and unify business data of all your sales channels seamlessly. Gain business intelligence and visibility into real-time data of your sales channels to consistently deliver a great customer experience across all touchpoints.
  • 19
    Fortra Robot
    The Robot product line is designed and developed with operators in mind. Our modern interfaces and enterprise-class functionality make it possible for even novice IBM i teams to manage the system by exception, freeing up time to focus on IT initiatives that add value and impact the bottom line. Robot’s roots run deep. We’ve been part of the IBM i community for 35+ years. We know the platform inside and out. More importantly, we understand the people who manage it and the organizations who run on it. When you need a partner on IBM i—not just a vendor—you need Robot.
  • 20
    IBM PowerVM
    IBM® PowerVM® is server virtualization without limits. Businesses are turning to PowerVM server virtualization to consolidate multiple workloads onto fewer systems, increasing server utilization and reducing cost. PowerVM provides a secure and scalable server virtualization environment for AIX®, IBM i and Linux applications built upon the advanced RAS features and leading performance of the Power Systems™ platform. Secure your enterprise environments with industry-leading hypervisor technology that ensures the integrity and isolation of critical applications and I/O. Scale out or scale up your virtualized deployments without paying underlying performance penalties. Provide services built for the cloud faster by automating deployment of virtual machines (VMs) and storage. Help eliminate scheduled downtime by deploying live mobility between servers. Optimize utilization of server and storage resources to control cost and boost return on investment.
  • 21
    NetTerm

    NetTerm

    NetTerm

    InterSoft International, Inc. produces award winning products designed to run on Microsoft Windows based workstations, allowing connectivity to IBM, UNIX, Windows and VMS based host computers. Our products are used worldwide by individuals and companies to meet their client / server needs. The robust nature of NetTerm allows it to be used by the military, IBM, federal courts, National Institutes of Health, public libraries, automobile dealerships and thousands of individuals requiring access to Internet accounts, public library systems and their database connectivity requirements. Professionals within the medical, financial and law related industries use NetTerm to search diverse databases located all over the world. The award winning NetTerm is a robust, configurable terminal emulator designed for Internet and intranet connections with support for Telnet, rlogin, dialup, and other connection protocols.
  • 22
    FlexTerm

    FlexTerm

    FlexTerm

    FlexTerm is written entirely in C# .NET, providing a new user interface that is long overdue for the terminal emulation community. The user interface utilizes the modern ribbon command bar to organize the program's features into a series of tabs at the top of the window. This increases discover-ability of features and functions, enables quicker learning of the program, and makes users feel more in control of their experience with the program. The ribbon replaces both the traditional menu bar and toolbars and is now fully customizable, allowing users to create their own custom tabs and tab groups. A FlexTerm workspace can consist of a single session, or any number of sessions, which may be docked and displayed as tabs and/or floating. Sessions within each workspace can be easily arranged using drag-and-drop functionality.
  • 23
    Rocket DevOps

    Rocket DevOps

    Rocket Software

    Our DevOps tools enable true end-to-end (CI/CD) for IBM i+ environments. Businesses can extend holistic DevSecOps best practices to the IBM i, pursue innovative experimentation, easily respond to compliance audits, and adapt to the ever-changing expectations of process, technology, or experience. In the face of changing regulations and the increasing threat landscape, Rocket DevOps, is part of Rocket’s Security & Compliance solutions designed to de-risk your modernization through the most robust technology, expertise, services, and support. And, with the unmatched experience of our DevOps services team, you’ll be set up for success quickly, with a customized implementation that works best for your business and the power to take ownership over any future changes. Businesses must respond to customer and market needs regardless of how their IT infrastructures are set up. Customers expect development and IT teams to deliver the applications and environments that help businesses excel.
  • 24
    Rocket iCluster

    Rocket iCluster

    Rocket Software

    Rocket iCluster high availability/disaster recovery (HA/DR) solutions ensure uninterrupted operation for your IBM i applications, providing continuous access by monitoring, identifying, and self-correcting replication problems. iCluster’s multiple-cluster administration console monitors events in real-time on the classic green screen and the modern web UI. Rocket iCluster reduces downtime related to unexpected IBM i system interruptions with real-time, fault-tolerant, object-level replication. In the event of an outage, you can bring a “warm” mirror of a clustered IBM i system into service within minutes. iCluster disaster recovery software ensures a high-availability environment by giving business applications concurrent access to both master and replicated data. This setup allows you to offload critical business tasks such as running reports and queries as well as ETL, EDI, and web tasks from your secondary system without affecting primary system performance.
  • 25
    mPower Cloud Migration Factory

    mPower Cloud Migration Factory

    Meridian Group International

    Meridian's mPower Cloud Migration Factory is a comprehensive solution that helps businesses of all sizes migrate their workloads to the cloud quickly, securely, and cost-effectively. Our proven methodology minimizes downtime and disruption to your business and ensures the successful migration of workloads to the cloud. Migrating to the cloud can help you to reduce your IT costs in a number of ways, such as eliminating the need to purchase and maintain hardware and software, and scaling your resources up or down as needed. The cloud gives you the agility to quickly deploy new applications and services, and to easily scale your resources up or down to meet changing demands. The cloud offers a number of security features that can help to protect your data from unauthorized access and use, such as data encryption, intrusion detection, and access control. Meridian's mPower Cloud Migration Factory offers a variety of features to help you migrate your workloads to the cloud.
  • 26
    DROPS

    DROPS

    DROPS

    DROPS is a release management tool designed to simplify, secure, and centralize the deployment of applications across data centers, hybrid, and multi-cloud infrastructures. It supports a wide range of platforms, integrates seamlessly with various CI/CD pipelines, and offers both agent-based and agentless operations. With features like full-stack release management, automated infrastructure provisioning, and 24/7 availability, DROPS aims to streamline deployment processes and ensure consistent, reliable delivery. The tool is flexible enough to manage both legacy and modern applications, catering to diverse enterprise needs. Select agent-based or agentless operation. No need for agent installation and management. DROPS adapts to your configuration and if agents are needed, they are provisioned automatically. Plan and organize your application deployment from the web console with no scripting needed. Ease collaboration between stakeholders and technical teams.
  • 27
    Performance Navigator
    Performance Navigator is a graphical PC tool designed for performance analysis and capacity modeling across various platforms, including IBM i, AIX/VIOS, Linux, Solaris, and HP-UX workloads on IBM Power Systems, Oracle, and HP servers. It collects historical performance data with minimal overhead by securely feeding data from collection services, NMON, and/or SAR to the Windows client nightly, updating system history files. The software offers thousands of graphs, custom reports, and features to assist with performance analysis, server consolidation, and upgrades. Its "What If" functionality allows users to model hypothetical scenarios to determine how capacity changes will impact server performance, facilitating precise capacity planning decisions. Additionally, Performance Navigator provides swift problem determination, enabling users to obtain comprehensive summaries of system issues in under two minutes. It supports various platforms.
  • 28
    eXplain

    eXplain

    PKS Software

    eXplain is a specialized code-analysis and legacy-system evaluation tool from PKS Software GmbH, designed to deeply analyze, map, document, and assess legacy applications, especially on mainframe platforms such as IBM i (AS/400) and IBM Z, so organizations can understand what lives in their software, how it’s structured, and what parts are worth keeping, refactoring or retiring. It imports existing source code into an independent “eXplain server”, no need to install anything on the host system, then uses advanced parsers to examine languages like COBOL, PL/I, Assembler, Natural, RPG, JCL, and others, along with data about databases (Db2, Adabas, IMS), job-schedulers, transaction monitors, and more. eXplain builds a central repository that becomes a knowledge hub; from there, it generates cross-language dependency graphs, data-flow maps, interface analyses, clusterings of related modules, and detailed object-and-resource usage reports.
  • 29
    Rocket DataEdge

    Rocket DataEdge

    Rocket Software

    Rocket® DataEdge is a data integration platform that connects, virtualizes, and analyzes data across mainframe, distributed, and cloud environments. It brings together enterprise wide data intelligence, real time data movement, and zero copy access, so organizations can operationalize system of record data for analytics, AI/ML, and modernization while maintaining governance and minimizing disruption. DataEdge includes integrated capabilities for sub-second replication, SQL-based federation, and automated metadata and lineage discovery. It supports the most sources and targets in the industry, including legacy sources such as Db2, VSAM, IMS, Adabas, and Datacom, alongside modern cloud platforms. With built-in security, access controls, and operational safeguards, DataEdge reduces integration cost and risk while delivering consistent, governed access to critical data across hybrid architectures.
  • 30
    Rocket Secure Host Access
    Rocket® Secure Host Access is a security-first terminal emulation solution designed to protect access to critical host and mainframe applications. It extends modern identity and access management (IAM) controls directly to green screen environments. The platform enables phishing-resistant, passwordless authentication to reduce credential-based threats. Rocket Secure Host Access supports compliance with regulations such as HIPAA, PCI-DSS, and DORA. It works across desktop, web, and hybrid environments for flexible deployment and consolidated ongoing administration. Strong encryption standards like TLS 1.3 and SSH help safeguard sensitive data. The solution strengthens enterprise security without disrupting existing workflows.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB