Alternatives to AvailabilityGuard

Compare AvailabilityGuard alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to AvailabilityGuard in 2024. Compare features, ratings, user reviews, pricing, and more from AvailabilityGuard competitors and alternatives in order to make an informed decision for your business.

  • 1
    Fusion Framework System

    Fusion Framework System

    Fusion Risk Management

    Fusion Risk Management's software, the Fusion Framework System, enables you to understand how your business works, how it breaks, and how to put it together again. Our platform provides easy, visual, and interactive ways to explore every aspect of your business so you can identify single points of failure and key risks. Achieve resilience with greater speed and efficiency with Fusion’s flexible and integrated suite of platform capabilities that can be tailored to best fit the needs of your organization. We meet you wherever you are on your journey for more resilient operations. - Map critical service and product delivery processes as they actually are - Leverage objective risk insights that help you audit, analyze, and improve your business operations - Plan, orchestrate, and measure risk management and resilience activities with confidence - Leverage automation to reduce the burden of manual, time-consuming, repetitive tasks, freeing teams for higher value activities
  • 2
    Azure Chaos Studio
    Improve application resilience with chaos engineering and testing by deliberately introducing faults that simulate real-world outages. Azure Chaos Studio is a fully managed chaos engineering experimentation platform for accelerating the discovery of hard-to-find problems, from late-stage development through production. Disrupt your apps intentionally to identify gaps and plan mitigations before your customers are impacted by a problem. Experiment by subjecting your Azure apps to real or simulated faults in a controlled manner to better understand application resilience. Observe how your apps will respond to real-world disruptions such as network latency, an unexpected storage outage, expiring secrets, or even a full data center outage with chaos engineering and testing. Validate product quality when and where it makes sense for your organization. Take advantage of a hypothesis-based approach to drive application resilience with integrated chaos in your CI/CD pipeline.
    Starting Price: $0.10 per action-minute
  • 3
    PerfectScale

    PerfectScale

    PerfectScale

    With insights that improve stability and reduce waste, PerfectScale provides comprehensive visibility and data-driven intelligence across large-scale distributed systems. By tracking usage patterns and configuration trends over time, we provide DevOps and SRE teams with the necessary data to right-size their K8s environments and continuously meet demand. PerfectScale eliminates the manual efforts and tedious toil of optimization by autonomously keeping your cloud costs low and your environment stable and resilient. By continuously calibrating to your environment’s ever-changing demand, configurations, and code releases, our safe, autonomous actions ensure you always meet demand in the most cost-effective way possible. Proactively eliminate misconfigurations that cause SLA breaches, erode your error budgets, and put resilience and performance at risk. PerfectScale quickly pinpoints and autonomously eliminates under-provisioning errors that cause latency, downtime, and outages.
  • 4
    Continuity Patrol
    Redefine your approach to recovery with the industry’s most comprehensive, most-modernized recovery automation suite. In today’s always-on business world, customers, partners, and employees expect 24/7 access to services and data. Unplanned downtime from natural disasters, cyber-attacks, and outages are the biggest availability threats. With an effective recovery plan and solution in place, organizations become resilient and are able to easily resume operations with minimal downtime and data loss. Continuity Patrol™ from Perpetuuiti’s Resiliency Automation Platform enables organizations to recover from disruption or an outage with the lowest recovery point objectives RPOs and fastest recovery time objectives RTOs in the industry, dramatically limiting data loss and downtime. One simple, agile solution saves you time, resources and costs while making it easier and faster to manage workloads at scale.
  • 5
    Datree

    Datree

    Datree.io

    Block misconfigurations, not deployments. Automated policy enforcement for Infrastructure as Code. Enforce policies to prevent misconfigurations in Infrastructure as Code such as Kubernetes, Terraform, CloudFormation, and more. Achieve application stability with automatic tests of every code change for policy violations or misconfigurations that may cause service outages or degraded performance. Adopt cloud-native infrastructure with minimal risk by applying built-in policies, or create custom policies to meet specific requirements. Focus on building better applications, not on infrastructure, by enforcing built-in policies for Kubernetes, Terraform, CloudFormation, and other infrastructure orchestrators. Eliminate manual code reviews for infrastructure-as-code changes, with checks that run automatically on every pull request. Keep the current DevOps workflow, with policy enforcement that integrates seamlessly with existing source control systems and CI/CD pipelines.
    Starting Price: $10 per user per month
  • 6
    CURA

    CURA

    CURA Software

    CURA's ERM (Enterprise Risk Management) solution enables organizations to better manage/control enterprise risk. CURA’s Legal Compliance solution enables organizations to create a harmonized set of internal controls to facilitate operational transparency. CURA's Risk Based Audit management solution provides a systematic, disciplined approach to audit management. CURA Advisory team provides a single, thorough approach to enhancing corporate GRC, quality processes initiatives enabled through technology. CURA’s Operational Risk Management solution enables organizations to effectively & efficiently manage the risk of loss resulting from inadequate internal processes. CURA’s Incident Management solution enables organizations to capture, classify & manage reportable events, to create a safer workplace & better manage business risks. With CURA, Organizations can ensure operational resilience using predefined measures to anticipate and prepare for potential outages and disruptions.
  • 7
    IBM Resiliency Orchestration
    IBM Resiliency Orchestration offers Disaster Recovery (DR) and Cyber Incident Recovery (CIR) monitoring, reporting, testing and workflow automation capabilities of complex hybrid IT environments in a scalable, easy-to-use solution built on industry standards. Choose from 450 pre-packaged patterns and intelligent workflow automation to improve reliability while reducing the need for extensive expertise for enterprise applications. Orchestrate DR life cycle management with an automated workflow that limits human error, enables faster recovery while ensuring that DR activities are performed within SLAs. Cyber Incident Recovery, a capability of IBM Resiliency Orchestration is designed to recover data and platform configurations very quickly in the event of a cyber outage. Enable predictable recovery within business-set SLAs with DR exercise automation and ensure consistent achievement of prescribed RTO/RPO.
    Starting Price: $39.50 per month
  • 8
    IBM Cloud Zerto
    Zerto provides disaster recovery and cloud mobility within a single, simple, scalable solution. Watch the video to learn how IBM Cloud® is combating downtime and outages while enabling access and availability. Use agentless, non-disruptive continuous data replication with journaling versus snapshots. Quickly recover to a point in time, seconds before a cyberthreat, like ransomware, occurs. Help guard your brand from outages and disruptions with continuous data protection. Avoid ransomware cost, downtime and data loss with 30-day, any-point-in-time recovery. Empower transformation with a unique hybrid cloud strategy by using the cloud that’s right for you.
  • 9
    Zenoss

    Zenoss

    Zenoss

    Zenoss Cloud is the first SaaS-based intelligent IT operations management platform that streams and normalizes all machine data, uniquely enabling the emergence of context for preventing service disruptions in complex, modern IT environments. Zenoss lets enterprises focus on growing their businesses by freeing them from the work that slows down architecture and operations teams. Organizations using Zenoss can eliminate infrastructure blind spots, predict impacts to business services before they cause outages, and resolve incidents faster — operating at whatever scale the business requires. Zenoss Cloud is the first SaaS-based intelligent IT operations management platform that streams and normalizes all machine data, uniquely enabling the emergence of context for preventing service disruptions in complex, modern IT environments. Zenoss is built for modern IT infrastructures. Let's discuss how we can work together.
  • 10
    Datafold

    Datafold

    Datafold

    Prevent data outages by identifying and fixing data quality issues before they get into production. Go from 0 to 100% test coverage of your data pipelines in a day. Know the impact of each code change with automatic regression testing across billions of rows. Automate change management, improve data literacy, achieve compliance, and reduce incident response time. Don’t let data incidents take you by surprise. Be the first one to know with automated anomaly detection. Datafold’s easily adjustable ML model adapts to seasonality and trend patterns in your data to construct dynamic thresholds. Save hours spent on trying to understand data. Use the Data Catalog to find relevant datasets, fields, and explore distributions easily with an intuitive UI. Get interactive full-text search, data profiling, and consolidation of metadata in one place.
  • 11
    NG-xTVMS

    NG-xTVMS

    Net Research

    IP transmission is subject to traffic congestion, packet losses, and variable delay. This causes real distortions to digital video signals. Error propagation in a video is worse than in audio and much worse than in data. Prevent customer attrition by catching outages and issues before they become a problem. Encoding issues on live and prerecorded videos may cause problems at the head-end, affecting all subscribers. Checking program video quality before encryption allows for detecting problems. Customer equipment issues are frequently a major cause of poor service or total failure. Detecting these problems before the customers do is a hallmark of quality service. Therefore EOC(End Office Equipment) diagnostics are highly recommended for each EOC device. IPTV is a complex technology combining many layers of information, protocols, and equipment. Interaction of these components can cause problems during installation as well as during normal operation.
  • 12
    IBM z/OS
    IBM® z/OS® brings the computing power and resources of the IBM Z® platform to help you drive business transformation and accelerate innovation. Get the stable, secure environment your organization requires to improve performance for mission-critical workloads and meet future challenges. A highly secure and scalable operating system for running mission-critical applications. The new IBM® z16™ platform accelerates decision velocity, protects against threats across your business, and modernizes for hybrid cloud. IBM z/OS V2.5 enables innovative development to support hybrid cloud and AI business applications, along with next-level technologies for security and resilience. With a continuous delivery model, new z/OS capabilities are available quarterly with no impact on stability, complexity, or costs. Achieve rapid application development and provisioning for hybrid cloud deployment. Simplified and modern experience for easier installation, management, etc.
  • 13
    Castellan Software Suite

    Castellan Software Suite

    Castellan Solutions

    Castellan software helps organizations drive readiness and response ​to minimize the impact of disruptions and protect their people, brand, and bottom-line. Built for the evolution of resilience management, Castellan’s SaaS platform offers a fully integrated solution that helps users: -Analyze and prioritize risk, -Develop actionable response and recovery plans, -Communicate with employees via multiple channels, -Stress test plans via plausible scenarios, -Quickly mobilize response teams in the critical moments of an incident occurring, -And more, all within a single platform. Castellan delivers configurable functionality using an intuitive interface that fully aligns to leading practice. Available in a wide range of languages and supported by world-class customer success and support teams available 24/7/365 globally, Castellan is the preferred solution to develop, maintain, and improve resilience and continuity capabilities.
  • 14
    Appranix

    Appranix

    Appranix

    Appranix empowers enterprises to achieve cloud application resilience against any cloud application downtime. Average ransomware attack costs 4.54M USD and takes about 26 days to recover. 14% of cloud application downtime occurs due to misconfigurations. Appranix's unique approach delivers unprecedented resilience for distributed and dynamic cloud workloads. Our patented continuous cloud infrastructure backup, cloud-native data backup and replication along with automated recovery-as-code capabilities significantly reduce recovery time and human intervention after a cyber disaster or cloud service or region failure. Appranix is a Gartner Cool Vendor and EMA Top 3 vendor. Our SaaS platform is SOC II Type II certified and available on AWS, Azure, GCP, VMware, IBM/Redhat marketplaces. Join leading CTOs, CIOs, and cloud operations teams who trust Appranix to deliver the resilience they need to thrive in today's digital world.
    Starting Price: $25/unit/month
  • 15
    Arpio

    Arpio

    Arpio

    Protect your critical applications from outages and ransomware attacks with automated cross-region, cross-account disaster recovery for your AWS cloud. Maintain operational continuity during cloud outages with minimal disruption. Recover safely from ransomware attacks without giving in to ransom demands. Whether it's insider threats or outside hackers, your business will always be able to recover. For security pros guarding the fort, Arpio is the ace up your sleeve. With Arpio, you’re prepped with a recovery environment your adversaries can’t touch, ready to switch on like a backup generator. No automation to write, and no AWS docs to decode. You can have DR in place today. Automatic replication, change detection, and real-time alerts. This is your DR on autopilot. Recover quickly from outages. Recover safely from ransomware. Unlike traditional DR tools, Arpio recognizes and replicates everything your cloud workloads need to run.
    Starting Price: $12,000 per year
  • 16
    Evolven

    Evolven

    Evolven Software

    Evolven is the leading Configuration Intelligence Platform automating change and configuration controls across the hybrid cloud. Evolven's platform provides DevOps, SRE, CloudOps, and IT Ops with a unified view of the detailed end-to-end configuration state of their environments from applications to infrastructure, from on-premise data centers to the public cloud. Using AI-based analytics, Evolven detects and prioritizes risks triggered by actual, granular changes in configuration, application, infrastructure, and data so that you can prevent and rapidly resolve stability, compliance, and security issues. Despite the higher pace of changes in agile environments, the result is a greater user experience for customers. With Evolven, DevOps, CloudOps, and IT Ops teams experience greater visibility into their environments, fewer incidents and faster MTTR.
  • 17
    ServiceNow IT Operations Management
    Predict issues, reduce user impact, and automate resolutions with AIOps. Move away from reactive IT operations with insights and automation. Identify anomalies and solve issues before they occur with cross-team automation workflows. Deliver proactive digital operations with AIOps. Stop chasing false positives and identify anomalies with less guesswork. Collect and analyze telemetry data for enhanced visibility and reduced noise. Find the root cause of incidents and share actionable insights across teams. Reduce outages by taking action based on guided recommendations. Shorten recovery times by rapidly implementing solutions based on insights. Simplify repetitive tasks with pre-built playbooks and knowledge base resources. Create a performance-driven culture across teams. Give DevOps and Site Reliability Engineers (SREs) visibility into microservices to improve observability and speed up incident response. Go beyond IT operations to manage the entire digital lifecycle.
  • 18
    CL360

    CL360

    CLDigital

    A global leader in enterprise risk and resilience software. Software-as-a-Service to turn raw risk data into strategic insights with end-to-end, integration, and analytics solutions. Provide cross-organizational insights to operational leaders through dependency mapping and tracking of key performance indicators. Analyze data to determine stakeholders affects and change impact on people, process, tools, organizational structure, roles, and technology. No-code development platform for organic program updates and management, creative applications, and scalability. Empower your organization with our Operational Resilience solution, designed to prevent, adapt to, and recover from disruptions, while mapping complex interactions across departments for seamless business continuity.
  • 19
    IBM Sterling Global Mailbox
    IBM® Sterling Global Mailbox 6.0 helps companies address demands for high availability operations and redundancy with a robust and reliable data storage solution available across geographically distributed locations. The solution supports active-active communications for disruption resiliency and disaster recovery in near real-time. Global Mailbox is available for IBM Sterling B2B Integrator and IBM Sterling File Gateway and designed to work with IBM Sterling Control Center. Provides capabilities to maintain high availability and efficient disaster resilience and recovery, including active-active communications. Real-time data replication eliminates the need for backup databases or custom-built approaches to disaster recovery. Flexible and configurable geographic distribution options to meet performance and customer-service level requirements. Enables always-on operations. Disaster resiliency and recovery. Configurable geographic distribution. Easy to use and intuitive UI.
  • 20
    BigPanda

    BigPanda

    BigPanda

    Aggregate data from all observability, monitoring, change and topology tools. BigPanda’s Open Box Machine Learning will correlate the data into a small number of actionable insights so incidents are detected in real-time, as they form, before they escalate into outages. Accelerate incident and outage resolution by automatically identifying the probable root cause of problems. BigPanda identifies both root cause changes and infrastructure-related root causes. Resolve incidents and outages faster. BigPanda automates and streamlines the incident response lifecycle across incident triage, ticketing, notifications, and war room creation. Accelerate remediation by integrating BigPanda with enterprise runbook automation tools. Applications and cloud services are the lifeblood of every company. When there’s an outage, everyone is impacted. BigPanda cements AIOps market leadership with $190M in funding, $1.2B valuation.
  • 21
    Onesait ADMS

    Onesait ADMS

    minsait ACS

    Onesait ADMS combines real-time monitoring and control, advanced distribution applications, and outage management, using distributed intelligence with grid edge technologies. While many utilities today have yet to realize the full benefits of a DMS implementation, Minsait ACS is solving this challenge by delivering true ROI with our Onesait Advanced Distribution Management System (ADMS). Based on our more than 40 years of experience delivering “mission critical” real-time systems, Onesait ADMS features advanced analysis applications to optimize network operations, combined with field-proven SCADA for monitoring and control and integrated Outage Management for tracking, analyzing and restoring outages, all resulting in improved network resiliency, reliability and power quality. Onesait ADMS is a DER-enabled solution with a flexible, distributed architecture design that helps utilities effectively integrate DER assets and grid-edge devices.
  • 22
    Skyhigh Cloud-Native Application Protection Platform
    Enable the development and deployment of your cloud-native applications while identifying hidden risks caused by misconfigurations, threats, and vulnerabilities, all from a single platform. Skyhigh Cloud-Native Application Protection Platform (CNAPP) secures your enterprise cloud-native application ecosystem using the industry’s first comprehensive, automated, and frictionless platform. Comprehensive discovery and risk-based prioritization. Shift Left to detect and correct misconfigurations. Achieve continuous visibility into multi-cloud environments, automated misconfiguration remediation, access a best practice compliance library, and identify configuration issues before they cause a significant impact. Automate security controls for continuous compliance​ and audit. Centralize data security policy management and incidents management, maintain records for compliance and notification, manage privileged access to protect sensitive data.
  • 23
    NetHavoc

    NetHavoc

    NetHavoc

    Overcome downtime to maintain customer trust. NetHavoc can change performance engineering and qualitative delivery on a massive scale. Deal with uncertainty before it causes obstacles in real-time. NetHavoc breaks the application infrastructure on purpose to create chaos in a controlled environment. Chaos engineering defines a strategy to witness how an application behaves with failures and make it more potent. The objective is to ensure application infrastructure is resilient in production with the early investigation. Discover the vulnerability of the application. Expose hidden threats and lessen uncertainties. Prevent breakdown influencing user-facing problems. Consume CPU cores or utilization. Validate real-time use cases by injecting various types of havoc, n number of times on the Infrastructure layer. Seamlessly interject havocs using the API and agentless approach. Specify either a specific time or define a random time range for applying havocs.
  • 24
    IBM PowerHA
    Provide near-continuous application availability with advanced failure detection, failover and recovery capabilities. IBM® PowerHA® technology provides high availability, business continuity and disaster recovery. It enables you to deploy an HA solution that addresses both storage and high availability requirements with one integrated configuration, which offers robust performance along with a simplified user interface. Power Systems is committed to investing in—and bringing to market—solutions designed to keep your IT environments resilient. IBM engineers work continuously to optimize IBM Power Systems hardware and operating systems to keep pace with the increasing demand.
  • 25
    Ai-RGUS

    Ai-RGUS

    Ai-RGUS

    Ai-rgususes Artificial Intelligence and custom-built software to automatically catch camera view problems; camera/NVR/DVR misconfigurations or failures; wrong timestamp; and missing or not enough days of recordings. With Ai-rgus you will save time compared to doing it manually and you will have peace of mind that your camera system has the footage you need before an incident. Efficient: Automated verification, saves time from manually reviewing cameras, and enables hassle-free camera system growth. AI verification is reliable and consistent. Proactive verification, providing confidence that desired image exists including for slip and falls and loss prevention cases. Ai-RGUS makes sure that the task of camera verification is done, with a consistent verification quality, and sends automatic email alerts.
  • 26
    F5 DNS Cloud Service
    F5 Cloud Services makes it easy to deploy your DNS into an expertly engineered, globally distributed, and DDoS-protected infrastructure. F5 DNS Cloud Services, consisting of primary DNS, secondary DNS, and DNS Load Balancer Cloud Service, boosts performance and provides global resilience for your apps across multiple clouds, geographies, and availability zones. Configure and provision Primary DNS, powered by a cloud-based, globally distributed anycast network. Direct clients to the nearest available application instances for the best user experience. Integrate DNS into CI/CD pipelines using REST-based declarative API. Ensure high availability of your DNS environments with seamless failover to F5 Cloud Services. Save time and effort by automating DNS management using APIs. Prevent distributed denial-of-service (DDoS) attacks with built-in protection.
  • 27
    Redgate SQL Backup Pro
    Compress, verify, and encrypt SQL Server backups. Step-by-step wizards and a centralized GUI take the legwork out of creating, restoring, and verifying your backups. Automate backups, backup verification, restores, and log shipping. Protect against backups failing due to network outages. Save storage space, speed up network file transfer, and get up to 95% backup compression, higher than native SQL Server. Secure your backups with 256-bit AES encryption. Let backups verify themselves. Schedule regular restores that also run the gold-standard database integrity check, DBCC CHECKDB. It takes fast, small, secure SQL Server database backups, based on whatever schedule you set. With automated backup verification, you'll gain peace of mind, and save time, hassle, and money. Network resilience for fault-tolerant backup transfer, including automatic resuming of interrupted transfers. Multiple compression levels available.
  • 28
    Sophos Cloud Native Security
    Complete multi-cloud security coverage across environments, workloads, and identities. Boost efficiency with a single integrated cloud security platform. Sophos Cloud Native Security unifies security tools across workloads, cloud environments, and entitlements management. Integrated with SIEM, collaboration, workflow, and DevOps tools to increase agility across an organization. Your cloud environments need to be tough, hard to compromise and quick to recover. Our comprehensive and intuitive security and remediation tools can be managed by your security teams, or via Managed Services to fast-track your cyber resilience to best meet the security incidents of today. Leverage our extended detection and response (XDR) tools to identify and stop malware, exploits, misconfigurations, and anomalous behaviors. Hunt for threats, prioritize detections, and automatically connect security events to optimize investigation and response.
  • 29
    BMC AMI Capacity and Cost
    As digitization increases, so does the complexity of managing mainframe capacity and costs. BMC AMI Capacity and Cost portfolio increases availability, predicts capacity bottlenecks before they occur, and optimizes mainframe software costs that can consume 30-50 percent of the mainframe budget. Balance risk and efficiency to achieve operational resilience with visibility into workload changes that may impact your mainframe availability and business demand. Demystify the management of mainframe software license costs and pricing models, giving quantifiable business insights into technical cost data and their drivers. Diagnose capacity issues before they impact your business with intelligent workflows based on nearly half a century of BMC experience – empowering the next generation of mainframe. Intelligently manage capacity settings of less critical workloads to optimize costs while protecting service levels.
  • 30
    BMC Helix Operations Management
    BMC Helix Operations Management is a fully integrated, cloud-native, observability and AIOps solution designed to tackle challenging hybrid-cloud environments. Take a service-centric approach to observability data for truly effective AIOps. Combine 3rd party observability data such as metrics, events, logs, incidents, changes and topologies into a central IT data store. See service health and enable best-in-class root cause isolation via auto-generated dynamic business service models. Improve signal-to-noise ratio with AI event suppression, de-duplication, and correlation to create actionable situations. Gain immediate root cause isolation through AI probability assignments to causal nodes using data and service models. Prevent issues before they occur with Business Service Health monitoring and AI outage prediction. Troubleshoot rapidly with log enrichment and analytics. Easily request and execute automations from BMC or 3rd party tools.
  • 31
    OpenText Network Automation
    Pass audit and compliance requirements easily with proactive policy enforcement and audit and compliance reports. Improve network security by recognizing and fixing security vulnerabilities before they impact your network. Reduce costs by automating time-consuming manual compliance and configuration tasks. Hear how Greenlight group enabled one customer with over 4000 retail outlets to automate their network provisioning and facilitate hardware upgrades with Network Automation, resulting in lower costs and increased business support. Increase network stability and uptime by preventing inconsistencies and misconfigurations. Utilize configuration changes to determine if performance issues are related.
  • 32
    OneStep-JV

    OneStep-JV

    Business Control Systems

    POS system brings the most advanced technology available in a full-featured suite of applications for retailers and distributors. The OneStep-JV™ Point of Sale system combines the power and flexibility of Java and Oracle. Written in Java with Oracle as the embedded database at its foundation, OneStep-JV™ point of sale systems bring the most advanced and reliable technology and inventory management software available to achieve operational stability and cross-platform portability for retailers and distributors. The use of Java enables the operation of OneStep-JV™ POS systems on single-user computers, small and very large-scale networks and portable devices like Palm Tops running over a multitude of operating systems such as Windows and Windows Networks, Novell, Unix and Linux. The stability of Oracle gives OneStep-JV™ POS systems a resilient database foundation designed with auto-recovery features to enable database and inventory control software integrity.
  • 33
    Crypsis

    Crypsis

    Palo Alto Networks

    As the value of information increases in our digital economy, any disruption to information security can have a devastating impact on business operations, reputation, and ultimately, the bottom line. Crypsis Cyber Risk & Resilience Management (CRRM) services addresses this challenge. Our CRRM solutions proactively identify and assesses cyber threats and vulnerabilities that put your business at risk. We work with you to mitigate cyber risks and mature your information security program. Our Cybersecurity Risk Management solutions are informed by our unparalleled experience in data breach incident response, focused on industry-specific needs, and tailored to your security budget.
  • 34
    Everbridge IT Alerting
    The 2020 cost of data center outages report from the Ponemon Institute quantifies the mean cost of an unplanned data center outage at slightly more than $8,662 per minute. And the biggest opportunity to reduce the overall length of an outage and associated costs is to optimize IT incident communications. Everbridge’s Workflow Designer accelerates the operational response to critical incidents by automating the actions and activities associated with the corresponding business processes. A self-service, drag & drop-based graphical user interface to define and monitor workflows. A wide variety of ready-to-use workflow components such as computer processes, conditional nodes, and human activities. Out-of-the-box best practice packs including incident templates, communication plans, runbook, and batch tasks. Built-in connectors for a wide variety of IT applications system monitoring, SIEM, APM, NPM, DevOps, event correlation tools, BCM, ITSM systems such as ServiceNow.
    Starting Price: $24 per month
  • 35
    CloudWize

    CloudWize

    CloudWize

    With CloudWize, cloud teams can regain visibility and control over their ever-changing cloud environment, creating an optimized, problem-free cloud architecture. Teams can troubleshoot faster, prevent incidents from reoccurring, detect divergence from best practices, optimize cloud related costs and ensure that all security and compliance policies are met. Get alerts on changes with significant cost implications before it’s too late, and enjoy an enhanced ability to avoid budget overruns. Provide your FinOps team with the ability to query and search for misconfigurations that impact costs. Avoid recurring cloud configuration errors. Continuously implement CloudOps & FinOps accumulated knowledge. Analyze your architecture with our advanced multi-service querying capabilities. Use our unique, easy to use graphic language to look for potential cost savings, improve configurations or detect policy breaches to avoid downtime or exposure.
  • 36
    e-terradistribution
    GE’s Network Outage Management is a Trouble Call and Outage Management System that forms an integral part of the e-terradistribution suite of applications. It allows operators to manage unscheduled and planned network outages from within a unified operating environment that integrates Switching Operations, SCADA, Automated Metering Data, Crew Monitoring and Real-Time Network Analysis. From the initial notification of a fault through prediction, crew assignment and restoration switching to return-to-normal, the dispatcher is able to work from a single set of network views. All the necessary information for each phase of the job is clearly presented in a way that allows the dispatcher to manage each outage efficiently while also staying aware of other network activity. Grid Solutions, a GE Renewable Energy business, serves customers globally with over 13,000 employees. Grid Solutions provides power utilities and industries worldwide with equipment, systems and services.
  • 37
    TSMS

    TSMS

    Triangle Solutions

    Monitoring the complete IT environment can be done simply and flexible in TSMS. It is crucial to every organization to detect on time any deviations in all the IT systems, devices, networks and applications and prevent precious downtime. Every IT environment can be guarded with TSMS, as long as the devices talk TCP/IP and/or SNMP. Your monitoring will be adapted to your wishes with TSMS, from only down time monitoring to complete monitoring of important servers and business processes. Within TSMS you have the possibility to receive extensive reports concerning performance and availability of your entire IT environment. TSMS fulfills the most important needs, such as guarding IT processes, solve threatening incidents and place reports at one’s disposal about these incidents. TSMS gives you the certainty that your complete IT environment is pro-actively guarded (24/7), to prevent that incidents occur.
    Starting Price: $595 per year
  • 38
    Opmed.ai

    Opmed.ai

    Opmed.ai

    Unlock your OR's full potential, ensure optimal resource utilization, and build resilience with the power of network science and AI. Leverage advanced optimization algorithms to make the most of your OR's operational capacity, cut costs, and secure additional revenue opportunities. Gain visibility into the intricate connections within your OR so that you can allocate resources more efficiently, minimize downtime, and enhance overall operational efficiency. Build a resilient OR schedule that adapts to changes and disruptions, ensuring the continuous delivery of top-quality patient care. Easily integrate Opmed with your existing OR schedule, preserving your established workflows and systems, and ensuring a smooth transition to optimization. Plus, we don't need personal health or identification data. Tailor your OR schedule to your unique needs. Define your constraints and preferences, from staff availability to equipment use.
  • 39
    IBM DRaaS
    IBM DRaaS reliably helps recover critical IT business processes and data to support business resiliency. It also provides comprehensive disaster recovery services, including health monitoring as well as continuous replication of applications, infrastructure, data and cloud systems. Offers a reliable disaster recovery orchestration with automation and quick provisioning in a software-defined recovery environment that helps reduce errors, risks, and resources for testing and documentation. Provides optimized resiliency and a risk-based approach to protecting critical IT services. Cloud testing and DR process validation offers insight and scenarios to help your organization bolster resiliency and recovery time. Quickly setup and implement DRaaS on IBM Cloud in under an hour without causing disruption. DRaaS lays out a data-drive service environment for performing DR tests, and for testing patches and upgrades.
  • 40
    Azure Container Apps
    Azure Container Apps is a fully managed Kubernetes-based application platform that helps you deploy apps from code or containers without orchestrating complex infrastructure. Build heterogeneous modern apps or microservices with unified centralized networking, observability, dynamic scaling, and configuration for higher productivity. Design resilient microservices with full support for Dapr and dynamic scaling powered by KEDA. Advanced identity and access management to monitor container governance at scale and secure your environment. Scalable, portable platform with low management costs for improved velocity to production. Achieve high developer velocity and app-centric productivity while using open standards on a cloud-native foundation with no programming model requirement.
    Starting Price: $0.000024 per second
  • 41
    System Guard for SAP

    System Guard for SAP

    Novaline Information Technologies

    Powerful monitoring tool for SAP with real time alerts. System Guard is a SaaS tool, it's a SAP certified solution. Receive instant critical alert when SAP server shuts down or there is a network & connectivity problem, system crash & failure, failed or stopped process on operating system. Checks server status / availability, makes ping test online to servers every minute. Minimizes unplanned downtime, system & service outages. Automatically creates performance profile & statistics by measuring response time 24 / 7 by diagnostics, determines system baselines & metrics and normal ranges with a smart algorithm without needing any fixed thresholds. Graphically presents performance statistics on dashboards and visualizes load balancing on servers.
  • 42
    Blazent

    Blazent

    Blazent

    Raise the accuracy of your CMDB data to 99%, and keep it there. Reduce source system determination times for incidents to zero. Gain complete transparency to risk and SLA exposure. Optimize service billing, eliminating under billing and clawbacks, while reducing manual billing and validation. Reduce maintenance and license costs associated with decommissioned and unsupported assets. Improve trust and transparency by eliminating major incidents, and reducing outage resolution times. Overcome limitations associated with Discovery tools and drive integration across your entire IT estate. Drive collaboration between ITSM and ITOM functions by integrating disparate IT data sets. Gain a holistic view of your IT environment through continuous CI validation across the broadest range of data sources. Blazent delivers data quality and integrity, driven by 100% data accuracy. We take all your IT and OT data from the broadest range of sources in the industry, and transform it into trusted data.
  • 43
    Recovery Point

    Recovery Point

    Recovery Point

    Recovery Point is a pure-play provider of cyber resiliency, disaster recovery, and business continuity solutions. Our focus is on one goal, to protect the performance of your business. Through our comprehensive suite of proactive services and solutions, you can have confidence your organization is ready for any disruption. Cyber preparedness and ransomware recovery, utilizing modern data protection, automation and orchestration, and unparalleled recovery expertise. Hybrid IT and business resiliency for x86, mainframe, and heterogeneous environments, blending legacy support with modern recovery solutions. Using proven methodologies, we assess your current level of readiness and develop a clear definition of your objectives, ensuring a roadmap to operational resilience. Harness predictive and proactive strategies to ensure you stay ahead of the next generation of disruptions.
  • 44
    JCLCheck Workload Automation
    JCL Check Workload Automation helps reduce delays in your production cycle. It validates the accuracy of job control language (JCL) and also helps identify execution-time errors, such as security violations and missing data sets that could cause jobs to fail. By quickly validating JCL and identifying problems, it provides users with advanced warnings so corrective actions can be taken before the job is executed in the production cycle. Improves the integrity and readability of JCL by automating the enforcement of JCL standards. Detects a wide range of error conditions before production jobs and schedules are adversely impacted. Enhances efficiency by reformatting JCL to user-defined standards. Reduce repair time and eliminate failed restarts. Automate scheduling and job management. Fault-tolerant, highly available workload solution with an easy-to-use user interface. Efficient, finely tuned automation environment with predictive workload analytics.
  • 45
    Azilon Risk Manager
    Operational Risk Management is defined under the Basel Banking Accord as the risk of direct or indirect loss resulting from inadequate or failed internal processes, people and systems or from external events. Whatever your business and even before you have sold a product, operational risk threats are prevalent. The ability to understand such exposures, both in likelihood of occurrence and impact ensures that you can prioritize effective control for the most serious of risks. Understanding causality of faults will also assist staff improve their business practices, reduce costly errors and maintain a high level of delivery to your customers. Loss Data often referred to as internal data and is the process of accurately tracking loss event information and assigning such data points to business units, processes and control failures that caused or contributed to a fault.
  • 46
    AutoCloud

    AutoCloud

    AutoCloud

    Maintain visibility into multi-cloud security, compliance, cost, and drift with automated infrastructure diagrams, change tracking, and a GraphQL API. After an easy, agentless onboarding, AutoCloud continually gathers and standardizes your multi-cloud, multi-environment data, then provides a variety of methods to interact with it. Even small updates can cause unexpected application outages, performance degradation, or security incidents that take days to track down. Spot where problems were first introduced with "git diff" for your cloud Prevent incidents and stay on top of configuration drift with intelligent alerts. Digging through static, text-heavy security and compliance reports to find actionable information. Cross-referencing information from multiple third party tools with provider consoles. AutoCloud's custom visualization engine makes gathering insights easy.
    Starting Price: $1500 per month
  • 47
    Chkk

    Chkk

    Chkk

    Prioritize your top business-critical risks with clear and actionable insights. Continuously harden your Kubernetes availability. Learn from others and avoid repeating their mistakes. Eliminate risks before they cause incidents. Stay up to date with visibility across all your infrastructure layers. Catalog containers, clusters, add-ons, and dependencies. Consolidate insights across clouds, on-prem, and more. Get alerted about all EOL and incompatible versions. Never use spreadsheets or custom scripts again. Chkk’s mission is to enable developers to proactively prevent incidents from happening by learning from others and not repeating known mistakes. Chkk's collective learning technology mines and curates known errors, failures, and disruptions that the Kubernetes community (comprising users/operators, cloud providers, and vendors) has encountered, ensuring that past mistakes are not repeated.
  • 48
    Speedscale

    Speedscale

    Speedscale

    Validate the performance and quality of your apps with real-world traffic scenarios. Preview code performance, quickly spot problems, and rest assured your app runs optimally when it’s time to release. Mimic real-life scenarios, test load, and create intelligent simulations of third-party and internal backend systems to better prepare for production. No need to spin up costly new environments each time you test. Built-in autoscaling drives your cloud costs down even further. Bypass complex, homegrown frameworks and manual test scripts so you can ship more code, faster. Be confident that new code changes can handle high-traffic scenarios. Prevent major outages, meet SLAs, and protect the customer experience. Simulate third-party systems and internal backends for more reliable, affordable testing. No need to spin up costly, end-to-end environments that take days to deploy. Seamlessly migrate off legacy architecture without disrupting the customer experience.
    Starting Price: $100 per GB
  • 49
    DBOS

    DBOS

    DBOS

    A simpler, more secure way to build fault-tolerant cloud applications, powered by the revolutionary cloud-native DBOS operating system. Based on 3 years of joint MIT-Stanford open source R&D, DBOS revolutionizes cloud-native architecture. DBOS is a cloud-native OS that builds on a relational database to radically simplify today's complex cloud application stacks. DBOS powers DBOS Cloud, a transactional serverless platform that provides fault-tolerance, observability, cyber-resilience, and easy cloud deployment to stateful TypeScript applications. OS services are implemented on top of a distributed DBMS. Built-in transactional, fault-tolerant state management that simplifies the stack, with no need for containers, cluster management, or workflow orchestration. Seamless scaling, high performance, and high availability. Metrics, logs, and traces are stored in SQL-accessible tables. Smaller cyber attack surface, cyberattack self-detection, and cyber-resilience.
  • 50
    ConvergeOne OnGuard
    Maintaining an optimized, healthy, modern IT infrastructure can be a daunting task. ConvergeOne’s IT managed services powered by OnGuard lets your IT staff rest easy knowing that our team of engineers and industry-leading management platform are watching your environment. You shouldn’t have to use multiple tools to manage your infrastructure. OnGuard consolidates monitoring, management, and alerting into a single customer center portal view. Incidents can happen without warning. OnGuard’s advanced machine learning algorithms monitor your environment and alert our engineers before problems occur. History shouldn’t repeat itself. As we resolve issues in one environment, we create OnGuard audit bots to look for and resolve the same issue across each of our clients to prevent the issue from happening again. OnGuard is developed and built by ConvergeOne so we can quickly adapt to our client’s unique environments, requests, and needs.