40 Integrations with Aruba Cloud

View a list of Aruba Cloud integrations and software that integrates with Aruba Cloud below. Compare the best Aruba Cloud integrations as well as features, ratings, user reviews, and pricing of software that integrates with Aruba Cloud. Here are the current Aruba Cloud integrations in 2024:

  • 1
    BackBox

    BackBox

    BackBox

    BackBox offers a simple way to intelligently automate the backup, restoration, and management of all devices on a network by providing centralized management of devices such as firewalls, routers, switches, and load balancers. Each of these devices plays a critical role in the availability and security of an organization’s network, and BackBox ensures they all continue to function effectively and effortlessly, streamlining operations for optimal performance. BackBox provides a foundation to harmonize the configuration between multiple devices, enabling seamless integration, and assuring compliance to organization or industry security policies, standards, or guidelines. IT administrators can easily employ BackBox to track configuration changes and see the deviation with the baseline for compliance validation and remediation.
    View Software
    Visit Website
  • 2
    Pandora FMS

    Pandora FMS

    Pandora FMS

    With more than 50,000 customer installations across the five continents, Pandora FMS is a truly all-in-one monitoring solution, covering all traditional silos for specific monitoring: servers, networks, applications, logs, synthetic/transactional, remote control, inventory, etc. Pandora FMS gives you the agility to find and solve problems quickly, scaling them so they can be derived from any source, on-premise, multi cloud or both of them mixed. Now you have that capability across your entire IT stack and analytics to find any problem, even the ones that are hard to find. Thanks to more than 500 plugins available, you can control and manage any application and technology, from SAP, Oracle, Lotus, Citrix or Jboss to VMware, AWS, SQL Server, Redhat, Websphere, etc.
    Leader badge
    Starting Price: €18/month
  • 3
    Social WiFi

    Social WiFi

    Social WiFi

    Social WiFi is a Customer Engagement and Communication Tool that gives offline businesses the online edge. Typically, businesses that operate offline, such as Hotels, Restaurants, Bars and Shops do not have any easy and scalable way to identify who their customers are and communicate with them once they leave the premises to encourage them coming back. Online stores know everything about their visitors and customers, making it easier for them to advertise t them online and tempt them back to their site to complete purchases or buy more. Social WiFi’s technology provides offline businesses similar tools so that they generate more customer loyalty, spending and online recommendations. Social WiFi have clients and Partners in over 60 countries and are trusted by some of the world’s biggest brands and Telecom companies.
    Starting Price: $49/location/month
  • 4
    Kubernetes

    Kubernetes

    Kubernetes

    Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications. It groups containers that make up an application into logical units for easy management and discovery. Kubernetes builds upon 15 years of experience of running production workloads at Google, combined with best-of-breed ideas and practices from the community. Designed on the same principles that allows Google to run billions of containers a week, Kubernetes can scale without increasing your ops team. Whether testing locally or running a global enterprise, Kubernetes flexibility grows with you to deliver your applications consistently and easily no matter how complex your need is. Kubernetes is open source giving you the freedom to take advantage of on-premises, hybrid, or public cloud infrastructure, letting you effortlessly move workloads to where it matters to you.
    Starting Price: Free
  • 5
    Surge Social

    Surge Social

    Surge Social

    Some key features of our platform include: Customizable landing page - With the built-in page editor, you can create a beautiful and effective landing page that your guests will be greeted with when they connect to the Wi-Fi Create a database of clients - Collect contact details of clients to be able to let them know of any special promotions or events that you put in place Automatic Redirection - Once a client has connected to your Wi-Fi, they can be redirected to you company webpage, Online Menu or one of your social media pages Automated Marketing - With our platform, you can set up automated messages via email or SMS. You can thank clients for their visit, ask for reviews or offer extra benefits after a certain number of visits. Our platform is also able to connect clients to your Facebook Pixel, TikTok Pixel and Google Tags when they connect to the guest Wi-Fi.
    Starting Price: $7 per month per location
  • 6
    OfficeRnD Hybrid
    OfficeRnD Hybrid is a workplace management software that helps companies efficiently manage the hybrid workplace environment. The software simplifies desk and room booking, visitor management, inventory management, and more. The platform comes with a suite of web and mobile apps that enhance employee engagement and help employers communicate benefits and perks. OfficeRnD Hybrid helps companies enable and manage hybrid office environment through modern and easy to use web and mobile apps. Supporting both remote and office working is now simple and smarter. Empower employees to easily see and reserve available desks on the days they plan to go to the office. Find and reserve a desk from anywhere. See real time availability of desks. Manage assigned and shared desks. Give everyone a live floor plan of the office with desk and room availability. Make it easy to find and book the right room from any device. Smart room scheduling takes care of notifications and reminders.
    Starting Price: $139 per month
  • 7
    Switch Automation

    Switch Automation

    Switch Automation

    Switch Automation helps enterprises bring people and planet to the center of building operations with smart building and analytics software. With Switch Automation, real estate leaders can quickly scale growth with greener buildings, healthier workplaces, and increased Net Operating Income. Switch's platform integrates with building system data across an entire portfolio and offers the most complete, holistic view of building health information. Our professional services team of sustainability experts, energy engineers, and data sciences support with real-time data analysis and asset optimization. Switch Automation's software has reduced CO2 emissions by 17,000 tons across more than 4,200 buildings globally. Transform your business to be data-centric, creating new revenue models, driving productivity and unlocking cost savings. Take command of your operations with all buildings, all services and all teams monitored, measured and controlled in real-time.
  • 8
    Nexpose

    Nexpose

    Rapid7

    Vulnerability management software to help you act at the moment of impact Vulnerabilities pop up every day. You need constant intelligence to discover them, locate them, prioritize them for your business, and confirm your exposure has been reduced. Nexpose, Rapid7’s on-premises option for vulnerability management software, monitors exposures in real-time and adapts to new threats with fresh data, ensuring you can always act at the moment of impact. If you’re looking for more advanced capabilities such as Remediation Workflow and Rapid7's universal Insight Agent, check out our platform-based vulnerability management software, InsightVM. How stale is your data? A few days? A few weeks? With Nexpose, you’ll never act on intel older than a few seconds. Our vulnerability management software collects data in real-time, giving you a live view of your constantly shifting network.
  • 9
    Thunder TPS

    Thunder TPS

    A10 Networks

    Used by the top service providers and online gaming companies, Thunder TPS provides scalable and automated DDoS protection powered by advanced machine learning to detect and mitigate attacks. Multi-modal source-based defense pinpoints attackers without damaging users. 5-level adaptive mitigation policy, zero-day Automated Protection (ZAP), actionable distributed denial-of-service weapons Intelligence at a scale of 96M-entry black/white lists. Flexible and robust Distributed Denial of Service (DDoS) protection, with a wide range of hardware and software deployment models to meet your exact needs. High precision, automated DDoS mitigation solution is delivered as hardware or virtual appliances ranging from 1 Gbps to 500 Gbps. High-performance Netflow, Sflow, IPFIX-based DDoS detector for a complete reactive cyber attack defense solution. Available as a standalone appliance or integrated with aGalaxy 5000.
  • 10
    Spoom

    Spoom

    Spoom

    Do you really have the overview? Different reports are created throughout the company, data and statistics are kept up to date and a lot of time is spent on this. Sales, marketing, customer service, production, HR, they all have their reportings & KPIs, but what do you do with all these data? Does every stakeholder get to see it? Do you remember why you track all these data? Can you see the impact of these KPIs on your companies goals & vision? And above all, does everyone know about its existence? Make connections between different data that were previously spread across different departments. Visualize the impact of KPIs on your companies goals and vision, and discover new opportunities. Create clarity when you and your employees need it most and see the impact of data on your future business, company and teams. Make sure everybody is on the same page and every action taken by your employees can be linked to your strategy.
    Starting Price: €40 per user per month
  • 11
    Junos Traffic Vision

    Junos Traffic Vision

    Juniper Networks

    Junos Traffic Vision is a licensed traffic sampling application for MX Series 3D Universal Edge Routers. It provides details on network traffic flows that is useful for a wide variety of operations and planning activities. Junos Traffic Vision monitors packets as they are processed by the router, and captures details such as source and destination addresses, packet and byte count information. These details are aggregated and exported in a standards-based format for analysis and presentation by Juniper and third-party-based tools that support usage-based accounting, traffic profiling, traffic engineering, attack and intrusion detection, and SLA monitoring. Implemented inline and on service cards that provide high performance and scale, Junos Traffic Vision can be deployed in both active and passive configurations and can take place alongside lawful intercept filtering and port mirroring without impacting performance.
  • 12
    Check Point Infinity
    Organizations frequently implement multiple cyber security solutions in pursuit of better protections. As a result, they are frequently left with a patchwork security architecture that results in a high TCO. By adopting a consolidated security approach with Check Point Infinity architecture, businesses realize preemptive protection against advanced fifth-generation attacks, while achieving a 50% increase in operational efficiency and 20% reduction in security costs. The first consolidated security architecture across networks, cloud, mobile and IoT, providing the highest level of threat prevention against both known and unknown cyber-threats. 64 different threat prevention engines blocking against known and unknown threats, powered by threat intelligence. Infinity-Vision is the unified management platform for Check Point Infinity, the first modern, consolidated cyber security architecture built to prevent today’s most sophisticated attacks across networks, cloud, endpoints, etc.
  • 13
    Check Point IPS

    Check Point IPS

    Check Point IPS

    Intrusion Prevention Systems detect or prevent attempts to exploit weaknesses in vulnerable systems or applications, protecting you in the race to exploit the latest breaking threat. Check Point IPS protections in our Next Generation Firewall are updated automatically. Whether the vulnerability was released years ago, or a few minutes ago, your organization is protected. Check Point IPS delivers thousands of signature and behavioral preemptive protections. Our acceleration technologies let you safely enable IPS. A low false positive rate saves your staff valuable time. Enable IPS on any Check Point security gateway reducing total cost of ownership. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely.
  • 14
    Homebase

    Homebase

    Homebase

    Homebase is the only hubless solution for smart apartments. Connect your buildings with smart access control, community WiFi, device automation, and digital payments. One app. One fob. Every door in the building. Set schedules to allow access for residents and staff at configured times for various amenity spaces such as co-working spaces, gyms, and pools. Use one key fob or mobile app access for every door in the building. Create stays and customize access for every door and user. Send temporary access in as little as 10 minute increments. Use the Homebase widget to unlock doors straight to your homescreen. Connect all of your building infrastructure and devices while increasing your per unit NOI by $30+ a month. Homebase provides seamless multifamily WiFi connectivity across your entire building, with solutions for your amenity spaces, staff networks & more. Offer an instant internet connection to residents. Set prices and configure your own internet tiers.
    Starting Price: $30 per month
  • 15
    Rapid7 InsightConnect
    InsightConnect is Rapid7’s security orchestration, automation and response (SOAR) solution, with which you can accelerate your time-intensive, highly manual incident response and vulnerability management processes. Connect teams across your IT and security systems with clear communication, collaboration, and integration. Streamline your manual, repetitive tasks with connect-and-go workflows, no code necessary. Supercharge your security operations with automation that drives efficiency, without sacrificing analyst control. Streamline and accelerate highly manual, time-intensive, processes 24 hours a day. With more than 300 plugins to connect your IT and security systems, and a library of customizable workflows, you’ll free up your security team to tackle bigger challenges, while still leveraging their expertise. Incident response can be time consuming. If you’re suffering from alert fatigue, you understand.
  • 16
    Aruba ESP

    Aruba ESP

    Aruba Networks

    Aruba ESP (Edge Services Platform) is a next-generation, cloud-native architecture that enables you to accelerate digital business transformation through automated network management, Edge-to-cloud security, and predictive AI-powered insights with up to 95% accuracy. Only ESP delivers faster everything, time to remediation, speed of security protection, scaling of users and locations, and operational AIOps on a single, cloud-native architecture. Dynamic segmentation and policy enforcement rules to secure new devices. Cloud-managed orchestration across wired, wireless, and WAN. Ultimate flexibility, in the cloud, on-premises, or consumed as a service. Gain context, visibility, and control over all domains through a cloud-native, uniform console for Wi-Fi, wired, and WAN infrastructure. Aruba’s Unified Infrastructure simplifies and improves IT operations across campus, branch, remote, data center, and IoT networks, all managed and orchestrated in the cloud or on-prem.
  • 17
    EV Observe

    EV Observe

    EasyVista

    Increasing service and support efficiency and business satisfaction starts with predicting and avoiding downtime. EV Observe is a monitoring platform for network, IoT, IT infrastructure, cloud, and application monitoring that delivers an end-to-end service experience. We make it easy for organizations to embrace a proactive and predictive approach to service support, delivery, and observability, including collaborative self-help, self-healing, and comprehensive performance and availability insights. This helps teams to focus on value delivery and innovation that drives business outcomes, resulting in higher employee engagement and a better customer experience, increased productivity, and improved resiliency. Designed for SaaS monitoring in a multi-client, multi-site context for the cloud. Integrated software production tool covering the entire spectrum of software processes, and has instituted DevOps practices.
  • 18
    Hubstar Utilization
    HubStar is a dynamic workplace platform informs and guides your hybrid workplace strategy with insights on how much space you need to improve employee experience while reducing costs and carbon emissions. The HubStar platform includes space scheduling, an employee experience app powered by machine learning, space utilization measurement and prediction, automated floor plans, and space management. Shut down ghost town spaces on quiet days to save energy, then guide people into alternative spaces with HubStar Scheduling to deliver the best workplace experience. Get intelligent recommendations on exactly the size and type of spaces you need to improve your workplace experience. Ignite social connection, collaboration, and belonging by making it a breeze to get together, with purpose.
    Starting Price: $5,000 per year
  • 19
    Tenable

    Tenable

    Tenable

    Tenable’s Cyber Exposure Platform gives you all the insight, research and data you need to uncover weaknesses across your entire attack surface. See every asset across your entire attack surface—from cloud environments to operational technologies, infrastructure to containers, and remote workers to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk and aligning business goals with security initiatives. Products include: - Tenable.ep - Tenable.io - Tenable.sc - Tenable.ad - Tenable.ot - Tenable Lumin
  • 20
    VergeSense

    VergeSense

    VergeSense

    Let data be your guide. The VergeSense analytics platform gives workplace leaders the power to measure all aspects of office space. Make informed decisions to prepare for the new employee experience while saving millions in real estate costs. Workplace analytics platform powered by deep-learning sensors. VergeSense workplace analytics are powered by deep-learning sensors that count people across the office. Understand usage and occupancy of buildings, floors, seating areas, conference rooms, all the way down to individual desks. Last year's occupancy benchmarks are no longer relevant to today's workplace. Ready your office with the data you’ll need to build the most productive and safe environment for your team. Answer questions like: How many employees are coming into the office? How frequently and on what days? What spaces do they use and when? What desks are being used, and which can be reassigned?
  • 21
    Flame Analytics

    Flame Analytics

    Flame Analytics

    Flame Analytics is the leading BigData and AI platform that helps transform and make physical spaces smarter with its omnichannel digital marketing and analytics tools. Flame helps you to transform physical spaces thanks to the power of BigData and AI. We use standard and plug and play hardware to build bridges between the online and physical world offering powerful analytics and marketing tools. The real change begins here. It brings energy to your physical spaces, creating unique and memorable experiences. Discover how your customers behave and measure the performance of your physical spaces thanks to the most powerful and comprehensive analytics platform. Establish communication channels with your clients and visitors in physical spaces thanks to onboarding tools such as Guest WiFi and Mobile Apps. Create audiences based on your customers´ behavior and send them personalized digital campaigns based on location. Boost customer experience like never before.
  • 22
    Cylera Platform
    Cylera's cybersecurity and analytics solution is designed to deploy quickly and seamlessly integrate into your network saving you time, money, and headaches. Passive integration reduces risk of disruptions. Complete on-prem and cloud network visibility provides full deployment. Out-of-the-box integrations with pre-built APIs allow for quick deployment. Flexible architecture enables multiple sites and teams to collaborate. Cylera is more than just another cybersecurity platform. Purpose-built for complex, high-impact environments, our platform combines comprehensive contextual awareness with a deep understanding of operational workflows. Enabled by our AI-driven cybersecurity & intelligence platform, we provide real-time visibility to solve information technology and cybersecurity obstacles. Passively monitor your existing networks with Cylera. Cylera integrates with several of the platforms you use every day.
  • 23
    AirShield

    AirShield

    LOCH Technologies

    IoT has created the world’s largest attack surface — and 80% of IoT devices are wirelessly connected. Today’s networks and organizations were never built to handle the massive volume, velocity and hyper-connectivity of smart devices. Most businesses still struggle to identify IoT devices within their environment – creating new security blind spots. AirShield provides comprehensive visibility into the IoT and OT (operational technology) threat landscape in order to detect, assess and prevent risk from unmanaged, unsecured and misconfigured IoT devices. AirShield provides non-intrusive real-time visibility and comprehensive monitoring and protection for broad-spectrum wireless devices for IoT, Industrial Internet of Things (IIOT), Internet of Medical Things (IOMT), and OT environments, irrespective of operating system, protocol, or connection type. AirShield sensors connect to the LOCH Machine Vision Cloud. No on-premise server installation is required.
  • 24
    Nozomi Networks Vantage

    Nozomi Networks Vantage

    Nozomi Networks

    Nozomi Networks Vantage™ leverages the power and simplicity of software as a service (SaaS) to deliver unmatched security and visibility across your OT, IoT, and IT networks. Vantage accelerates digital transformation for the largest and most complex distributed networks. You can protect any number of OT, IoT, IT, edge and cloud assets, anywhere. Its scalable SaaS platform enables you to consolidate all of your security management into a single application, even as your networks quickly evolve. Vantage delivers the immediate awareness of cyber threats, risks, and anomalies you need to detect and respond quickly and ensure cyber resilience. You can protect a wide variety of mixed environments with rapid asset discovery, network visualization and accelerated security. Unified security for all of your sites with the power of SaaS. Eliminates blind spots and increases awareness with automated asset inventory.
  • 25
    Securonix Security Operations and Analytics
    The Securonix Security Operations and Analytics Platform combines log management; user and entity behavior analytics (UEBA); next-generation security information and event management (SIEM); network detection and response (NDR); and security orchestration, automation and response (SOAR) into a complete, end-to-end security operations platform. The Securonix platform delivers unlimited scale, powered by advanced analytics, behavior detection, threat modeling, and machine learning. It increases your security through improved visibility, actionability, and security posture, while reducing management and analyst burden. With native support for thousands of third-party vendors and technology solutions, the Securonix platform simplifies security operations, events, escalations, and remediations. It easily scales from startups to global enterprises while providing the same fast security ROI and ongoing transparent and predictable cost.
  • 26
    SecureW2

    SecureW2

    SecureW2

    Even for organizations under 500 employees, a 2020 IBM report found credential compromise averaged $2.35M in costs. Eliminate the threat by using x.509 certificates for Wi-Fi, VPN, Web Apps, Endpoint Login & more. Leverage your existing Wi-Fi, Web, Firewall and VPN infrastructure with zero technology forklift upgrades. With SecureW2, you can verify that only trusted users and devices can access your network and applications. Enabling 802.1x in the cloud has never been easier. SecureW2 provides everything you need to use your Azure, Okta, or Google to enroll and manage certificates for secure Wi-Fi authentication. Plus it comes with the World’s only Dynamic Cloud RADIUS server, giving you everything you need for secure WPA2-Enterprise network authentication. Onboard every major operating system with ease and deliver secure connections with no IT burden. Secure your network with certificates using the generation, delivery, authentication and renewal technology.
  • 27
    SmartShare
    The flexible Collaboration Suite for efficient teams. SmartShare brings all crucial information about what's going on together in one single, centralized system. The famous Company Overview feature shows all possible information about a customer in one single screen: ongoing projects, deals, contracts, offerings, etc. SmartShare brings structure in the way people work and share information. Collaboration between colleagues and teams is drastically improved thanks to the centralization of information in the shared environment. Customers report a time gain of 1h per day per employee. An advanced integrated access rights management system allows to make sure that information is only accessible to persons with sufficient access rights. Access rights can be managed at multiple level: individual, team, binder, project, document, etc. Emails are managed in the shared environment, which brings a huge productivity gain and efficient collaboration.
  • 28
    AuthControl Sentry

    AuthControl Sentry

    Swivel Secure

    Deployed in over 54 countries and implemented across enterprises including finance, government, healthcare, education, and manufacturing, AuthControl Sentry® provides organisations with true multi-factor authentication (MFA). It delivers an intelligent solution to prevent unauthorised access to applications and data. AuthControl Sentry® has the flexibility to support a range of architectural requirements and the ability to ensure maximum adoption, thanks to its variety of authentication factors. Patented PINsafe® technology for ultimate security. Supports on-premise and cloud for changeable architecture. A single tenancy and single-tiered cloud solution ensures optimised customization. Risk-based authentication and single sign-on as standard. Integrates seamlessly with hundreds of applications. Ensures maximum adoption with an extensive range of authenticators.
  • 29
    protel Voyager
    Give your guests and employees more time with the help of mobile tools, digital concierge, excellent information flow and much more. protel VOYAGER is an award-winning app that offers you a simple option to publish an app with your own branding, powered by protel PMS. Our vision is to deliver the technology ecosystem for the global hotel industry. More time for guests and employees through mobile tools, digital concierge, excellent communication and more. View and change personal profile information. Add your own preferences and special requests. Check-in and mobile keys for room admission. View invoice and check out. Book additional services such as room service. Make requests for housekeeping or room maintenance. View hotel information and specials. Enjoy all the content that the hotel provides. A modern PMS is the heart of every hotel business. Choose a PMS that seamlessly connects to the best technology in the hotel industry.
  • 30
    Netvisor ONE

    Netvisor ONE

    Pluribus Networks

    Moving to Open Networking bare metal switches brings significant operational and financial benefits to build next-generation networks. These switches provide the capacity needed to achieve cloud-scale, agility, elasticity, and adaptability. As you move to a disaggregated open networking strategy, selecting the right Network Operating System (OS) is a critical success factor. Why? The Network OS deployed unlocks the performance, functionality, and services from Open Networking switches to realize the most value. Netvisor® ONE is an open, secure, and programable next-generation Network OS that is purpose-built to optimize the power and performance of bare metal Open Networking hardware. Deployment-proven in production mission-critical enterprise and carrier networks, Netvisor ONE operating system meets the most stringent performance requirements and delivers the maximum levels of reliability and flexibility at scale, and without compromise.
  • 31
    Optiv Managed XDR
    Attackers are stealthy, relentless and motivated, and might use the same tools you do. They hide in your environment and quickly expand access. We understand the cyber ecosystem because it’s where we live, it’s where we operate. Our MXDR solution’s secret sauce derives from that pedigree, tested processes, proven IP, best-of-breed technology, leveraged automation and providing top-shelf talent to manage it all. Let’s collaborate and develop a custom solution with comprehensive threat visibility, accelerated incident identification, investigation, triage and mitigation actions to protect your enterprise from attacks and threats. We’ll start with your existing investments in endpoint, network, cloud, email and OT/IoT tools. Our experts will get those on the same team, actual technology orchestration! Reduces the attack surface, detects threats faster and automates deep investigation through a continuous approach.
  • 32
    Favendo

    Favendo

    Favendo

    Favendo RTLS and installation-service means mobile indoor positioning, wayfinding, people & asset tracking and proximity alerting on a Bluetooth basis. We provide planning, installation and roll-out of the hardware infrastructure for our customers during operation and provide high-performance software for any RTLS project. Our service covers on request training, system support and maintenance. We deliver real-time location for every field of application. The starting point of each service is the exact localization of people and assets indoors using Favendos Commander Location Engine. Favendo is specialized in on-premises solutions for complex architectural environments. High-quality beacons, tags and beacon trackers are the bedrock of our advanced proximity and real-time indoor location solutions (RTLS) like positioning and indoor navigation. So let’s take a look at an exemplary beacon and learn what’s important.
  • 33
    AriLinc

    AriLinc

    Infintrix Global

    AriLinc is an industrial IoT gateway that converts various PLC Modbus RTU and Modbus TCP into Modbus TCP, OPC UA, MQTT, AWS, and other protocols. AriLinc adopts an embedded Linux system, supports TSL, SSL encryption, provides 1 RS232/RS485 optional serial input, 1 power output, 2 Ethernet ports and 2 USB ports, and supports SIM card and SD card. The built-in 4G network or Ethernet access to the Internet has the characteristics of fast speed and low latency. The Lora Gateway S281 series are special for data acquisition via Lora technology, supports wireless sensors and a wireless RS485 serial data converter. It is widely used in agricultural greenhouses, chemical plant, electroplating plant, hospital sites and storage warehouses for real-time temperature and humidity collection/monitoring. We offer comprehensive IT solutions, customized software development, mobile application & web development along with offshore IT consultancy services.
  • 34
    MetricFire

    MetricFire

    MetricFire

    Built by engineers for engineers, our Prometheus monitoring tool is easy to configure, get set up, and begin sending metrics. We take care of scaling your Prometheus, so you don't need to worry about it. We keep your data long-term, with 3x redundancy, so you can focus on applying the data rather than maintaining a database. Get updates and plugins without lifting a finger, as we keep your Prometheus and Grafana stack updated for you. Everything you need to take control of your Prometheus metrics. Vendor lock-in's not our thing. We’re believers in you still owning your data, so you can request a full export at any time. That means you get all the benefits of an open-source tool, but with the security and stability of a SaaS tool. We keep all your data with 3 times the redundancy and keep your data in a safe place for up to 1 year. Scale without fear, we handle all the hassle for you. Prometheus experts are available 24 hours a day.
  • 35
    New Era

    New Era

    New Era Technology

    Facilitate modern workplaces with world-class collaboration and unified communication services. New Era provides communication solutions that streamline and integrate a vast array of collaboration and UC technologies, including audio visual technology, telephony, audio conferencing, web conferencing, video conferencing, unified messaging, instant messaging, digital signage, and more. We offer a complete end-to-end managed service for your entire unified collaboration environment. By empowering organizations to support their users from any location and device, we help drive productivity and achieve better business outcomes, ensuring users get the very best collaboration experience, enabling them to operate effectively regardless of whether they sit on-site or remote. Our vendor-agnostic approach allows us to integrate and manage multiple vendors and collaboration technologies. Let’s build a personalized service to meet your company’s communication needs.
  • 36
    LogMan.io

    LogMan.io

    TeskaLabs

    TeskaLabs Logman.io is a modern and effective tool for log management, collection, archiving, and log analysis. Scalable Log Management can be easily upgraded to the full-scale tool TeskaLabs SIEM (security information and event management). Be always one step ahead of all potential threats and achieve a total overview of the security of your IT infrastructure. Thanks to timely and clear threat detection, TeskaLabs LogMan.io protects important data and sensitive information. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. LogMan.io ensures regulatory compliance with legislation covering cyber security and GDPR. Logman.io can grow with your needs. It can be easily upgraded to TeskaLabs SIEM. You can promptly get a central essential overview of the entire IT infrastructure, a full-scale tool for threat modeling, risk management, and vulnerability scanning.
  • 37
    TeskaLabs SIEM

    TeskaLabs SIEM

    TeskaLabs

    A state-of-the-art tool for security information and event management. A security surveillance tool that allows you to automatically monitor, correlate, and evaluate security events and create reports in real-time. TeskaLabs SIEM will bring a central overview of the entire company infrastructure and early detection helps eliminate risks and their possible effects on the operation of your company. TeskaLabs SIEM will always be one step ahead of potential threats and you will gain absolute supervision. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. TeskaLabs SIEM ensures regulatory compliance with legislation covering Cyber Security, GDPR, and ISO 27001:2013. Automated real-time detection and reporting of known incidents and anomalies will allow you to quickly react and prioritize the solution to individual incidents. Time savings allow you to proactively search for potential threats.
  • 38
    MacMister Email Backup
    Email Backup software for Mac is known as one of the perfect tool when it comes to the export of data from multiple web emails to hard drive/IMAP server/cloud servers. Amplification of user efficiency by offering an instant technique of converting email from one webmail service to another. Protect meta headers & email properties like hyperlinks, images, formatting, subject, date, time, etc. Preserve exact folder hierarchy and data integrity throughout the email backup process. Choose the start backup to activate the backup email files process. Once the conversion is finished, a notification will appear on the screen. Then the destination folder opens with the ensuing file and Savelog.txt containing the email backup information.
  • 39
    SecHard

    SecHard

    SecHard

    SecHard is a multi-module software for implementing zero-trust architecture. SecHard provides automated security hardening auditing, scoring, and remediation for servers, clients, network devices, applications, databases, and more. A powerful identity and access management software to get compliant with zero trust and to prevent attacks like privilege abuse, ransomware, and more. SecHard solves the risk awareness problem in asset management. Automated discovery, access, identification, and remediation features provide ultra-wide visibility for all regulations. With the passive scanning method, SecHard operates the vulnerability detection and management processes for all IT assets without creating any risks. SecHard auto-discovers the certificates in the company’s environment report the expiration dates of these certificates, and it can automatically renew some of these certificates through well-known certificate authorities.
  • 40
    Ednetics

    Ednetics

    Ednetics

    Education and government are the cornerstones of community services. Through them, we believe technology has the largest potential to help the most people. Public institutions don’t always have the resources to use technology to its full extent. We are here to address this and help our communities succeed. We can assist at any step in your technology lifecycle. Our service portfolio, like our solutions, has evolved over time to better fit the needs of our customers. We offer end-to-end services from consulting to configuration to fully managed services. Whatever your need, the Ednetics team has you covered. We understand the challenges that you face when it comes to technology procurement that’s why we offer state purchasing contracts that have been thoroughly vetted by state purchasing agencies and consortia. We have partnered with leading manufacturers to bring industry innovations to your organization.
  • Previous
  • You're on page 1
  • Next