54 Integrations with Cisco ACI
View a list of Cisco ACI integrations and software that integrates with Cisco ACI below. Compare the best Cisco ACI integrations as well as features, ratings, user reviews, and pricing of software that integrates with Cisco ACI. Here are the current Cisco ACI integrations in 2024:
-
1
Netdata
Netdata, Inc.
The open-source observability platform everyone needs! Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: 💥 Collects metrics from 800+ integrations 💪 Real-Time, Low-Latency, High-Resolution 😶🌫️ Unsupervised Anomaly Detection 🔥 Powerful Visualization 🔔 Out of box Alerts 📖 systemd Journal Logs Explorer 😎 Low Maintenance ⭐ Open and Extensible Try Netdata today and feel the pulse of your infrastructure, with high-resolution metrics, journal logs and real-time visualizations.Starting Price: Free -
2
ThreatAdvice Cybersecurity Education
ThreatAdvice
ThreatAdvice Educate - Looking for an efficient and effective cybersecurity online training platform for your employees? ThreatAdvice Educate uses video-based micro-learning courses to arm your employees with the cybersecurity knowledge they need to protect your organization. Our comprehensive employee education platform includes phishing simulations, quizzes, gamification, policies and procedures, audit reporting, external scans and more. Did you know that over 90% of all enterprise cyber breaches occur because of an unsuspecting employee not being prepared in the basic steps of cybersecurity? Employees may be the biggest threat to your cybersecurity, but they can also be your most effective means of thwarting an attack. ThreatAdvice Educate provides cyber security training for employees that brings the necessary cybersecurity knowledge and skills to help you avoid a cyber-attack and protect valuable company data, and also provides regular phishing tests. -
3
INE
INE
Invest in INE's world-class IT training and certification prep to give you and your team the ability to meet today’s challenges and prepare for the future. Our training materials are produced entirely in-house by INE instructors who are the most respected and tenured experts in the industry, covering in-demand topics including Networking, Cyber Security, Cloud Computing, and Data Science. In addition, our suite of completely original training material is housed on our proprietary training platform designed to support a practical approach to learning. We develop your expertise through a blended approach of instructor-led videos, learning paths, quizzes, and hands-on exercises. We've helped thousands of professionals achieve their goals and develop successful IT careers.Starting Price: $49 per month -
4
AppDynamics
Cisco
We solve your most urgent business challenges with straightforward, flexible and scalable packages built to make your digital transformation a reality. Get started with our leading business observability platform, today. Get full-stack observability with a business lens from AppDynamics and Cisco. Prioritize what’s most important to your business and your people so you can see, share and take action in real-time. Turn performance into profit with a deeper understanding of user and application behavior. Correlate full-stack performance with key business metrics like conversions and quickly resolve issues before they impact the bottom line. Confidently face the unknowns in today’s technology landscape with easy-to-implement solutions that fuel growth, delight your customers and keep your people engaged in driving your business success. Connect app performance to customer experience and business outcomes, helping you prioritize the most critical issues before they affect your customers.Starting Price: $6 per month -
5
Telegraf
InfluxData
Telegraf is the open source server agent to help you collect metrics from your stacks, sensors and systems. Telegraf is a plugin-driven server agent for collecting and sending metrics and events from databases, systems, and IoT sensors. Telegraf is written in Go and compiles into a single binary with no external dependencies, and requires a very minimal memory footprint. Telegraf can collect metrics from a wide array of inputs and write them into a wide array of outputs. It is plugin-driven for both collection and output of data so it is easily extendable. It is written in Go, which means that it is a compiled and standalone binary that can be executed on any system with no need for external dependencies, no npm, pip, gem, or other package management tools required. With 300+ plugins already written by subject matter experts on the data in the community, it is easy to start collecting metrics from your end-points.Starting Price: $0 -
6
Upfeed
Upfeed
Engage customers with feature-voting. Upfeed helps companies get customer feedback with feature-voting. Accelerate growth and build the product people really want. Identify product opportunities to drive expansion revenue and keep retention high. Let your users build your next features. Collect customer feedback and feature ideas. Eliminate Trello board and guess work, share your feedback board and your users will build a real feedback. Users can upvote ideas. See which suggestions get the most votes and prioritize your roadmap more efficiently. Don't waste time building the wrong features. Automatically follow up with people when you release a feature. Keep the feedback loop going strong. We bring together everything that’s required to build a better product with customer feedback. Upfeed's products power feedback with feature-voting including a powerful dashboard that helps you make better decisions.Starting Price: $14 -
7
Switch Automation
Switch Automation
Switch Automation helps enterprises bring people and planet to the center of building operations with smart building and analytics software. With Switch Automation, real estate leaders can quickly scale growth with greener buildings, healthier workplaces, and increased Net Operating Income. Switch's platform integrates with building system data across an entire portfolio and offers the most complete, holistic view of building health information. Our professional services team of sustainability experts, energy engineers, and data sciences support with real-time data analysis and asset optimization. Switch Automation's software has reduced CO2 emissions by 17,000 tons across more than 4,200 buildings globally. Transform your business to be data-centric, creating new revenue models, driving productivity and unlocking cost savings. Take command of your operations with all buildings, all services and all teams monitored, measured and controlled in real-time. -
8
IBM Datacap
IBM
Streamline the capture, recognition and classification of business documents. IBM® Datacap software is a key capability of the IBM Cloud Pak® for Business Automation. It streamlines the capture, recognition and classification of business documents. Its natural language processing, text analytics and machine learning technologies identify, classify and extract content from unstructured or variable paper documents. Supports multichannel input from scanners, faxes, emails, digital files such as PDF, and images from applications and mobile devices. Uses machine learning to automate the processing of complex or unknown formats and highly variable documents difficult to capture with traditional systems. Enables you to export documents and information to a range of applications and content repositories from IBM and other vendors. Offers configuration of capture workflows and applications using a simple point-and-click interface to speed deployment. -
9
Comarch EDI
Comarch
Comprehensive and secure platform for B2B collaboration in a supply chain. The Comarch EDI platform provides data exchange with every business partner. In relation to technological advancement and the volume of documents we recommend a solution tailored to the business needs of your company. We provide a number of functionalities that will streamline communication with business partners. A GDSN-certified catalog that facilitates management of product data exchanged with many business partners worldwide that makes it possible to define several attributes – both general and available for a particular business partner. This functionality ensures high quality of data and coherence throughout the entire value chain. The solution for optimizing processes in a supply chain. It enables effective communication with logistics operators and guarantees fast and secure data flow and access to the current status of a logistic process. -
10
Cisco SD-WAN
Cisco
Cisco SD-WAN (formerly Viptela). Any user, any application, anywhere in the world. SD-WAN is a software-defined approach to managing the wide-area network, or WAN. Extend intent-based networking across the branch, WAN, and cloud. Connect any user to any application. Our industry-leading solution for multicloud transformation offers integrated capabilities for security, unified communications, and application optimization. Increase user productivity by optimizing cloud and on-premises application performance with real-time analytics, visibility, and control. Protect users, devices, and applications with embedded or cloud security and lays the foundation for secure access service edge (SASE). Centralize cloud management to make it easy to deploy SD-WAN and security while maintaining policy across thousands of sites. With a cloud-first architecture, maintain flexibility to connect any user to any application, across any cloud. -
11
Smokescreen
Smokescreen
Smokescreen is a deception technology & active defense company that provides a solution that blankets your network with decoys to trap hackers. With a demo of our product, IllusionBLACK, you'll understand how adversaries operate and see how decoys planted all over your network provide high-fidelity detections every step of the way. It's easy to understand, easy to use, and we've got you covered on the Perimeter, Cloud, internal network, endpoints, and Active Directory. Launch your first deception campaign using ready-made decoys. Focus on detecting threats instead of wasting countless man-days configuring a new solution. Any interaction with an IllusionBLACK decoy is a high-confidence indicator of a breach. When you get an alert, you know it’s the real deal. Automated forensics and root-cause analysis in two clicks. Accomplish more in a fraction of the time with half the team. Out-of-the-box integrations with SIEMs, Firewalls, EDRs, Proxy, threat intel feeds, SOAR, and more.Starting Price: $7,750 per year -
12
Mosaic
Intrado
Mosaic delivers digital conversations across all channels, orchestrated with our experts or on your own. Build once, deploy everywhere. Mosaic allows for your consumers to dynamically automate conversations with your brand leveraging intelligent virtual assistants. Enterprise-grade performance backed by industry expertise, regardless of industry or company size. Inbound and outbound across voice, text, social, and email. Cloud technology provides fast and easy solution activation, so you're up and running quickly. Mosaic enables personalized and easy experiences across all channels for your customers when they contact you. Like having your best employee engaged on every interaction to answer questions and facilitate transactions. Lifecycle managed services is a hands-on and consultative approach to delivering Mosaic. Intrado Success Coaches ensure that the software is maintained and updated with current controls and functionality, along with market best practices. -
13
Altair Knowledge Hub
Altair
Self-service analytics tools promised to make end-users more agile and data-driven. However, the increased agility led to siloed and disconnected work as part of an ungoverned data free-for-all. Knowledge Hub addresses these issues with a solution that benefits business users, while simplifying and improving governance for IT. With an intuitive browser-based interface that automates data transformation tasks, Knowledge Hub is the market’s only collaborative data preparation solution. Business teams can work with data engineers and data scientists using a personalized experience for creating, validating and sharing governed, trusted datasets and analytic models. With no coding required, more people can share their work to make more informed decisions. Governance, data lineage and collaboration are managed using a cloud-ready solution designed to create innovation. An extensible, low- to no-code platform allows many people across the enterprise to easily transform data. -
14
Imperva CDN
Imperva
Deploying your websites and applications around the globe can lead to more cyber attacks and fraud, unless you have effective security. The Imperva Content Delivery Network (CDN) brings content caching, load balancing, and failover built natively into a comprehensive Web Application and API Protection (WAAP) platform, so your applications are securely delivered across the globe. Let machine learning do the work for you. It efficiently caches your dynamically-generated pages, while ensuring content freshness. This significantly improves cache utilization and further reduces bandwidth usage. Take advantage of multiple content and networking optimization techniques to minimize page rendering time and improve user experience. Imperva’s global CDN uses advanced caching and optimization techniques to improve connection and response speeds while lowering bandwidth costs. -
15
Imperva WAF
Imperva
Web application attacks prevent important transactions and steal sensitive data. Imperva Web Application Firewall (WAF) analyzes traffic to your applications to stop these attacks and ensure uninterrupted business operations. A noisy WAF forces you to choose between blocking legitimate traffic or manually containing attacks your WAF let through. Imperva Research Labs ensure accuracy to WAF customers as the threat landscape changes. Automatic policy creation and fast rule propagation empower your security teams to use third-party code without risk while working at the pace of DevOps. Imperva WAF is a key component of a comprehensive Web Application and API Protection (WAAP) stack that secures from edge to database, so the traffic you receive is only the traffic you want. We provide the best website protection in the industry – PCI-compliant, automated security that integrates analytics to go beyond OWASP Top 10 coverage, and reduces the risks created by third-party code. -
16
Imperva DDoS Protection
Imperva
Imperva DDoS Protection secures all your assets at the edge for uninterrupted operation. Ensure business continuity with guaranteed uptime. When it comes to DDoS mitigation, the rule of thumb is: ‘moments to go down, hours to recover’. This is why, when defending against an attack, every second counts. Imperva gives you the peace of mind that attack traffic will be automatically blocked at the edge – without you having to scale up in bandwidth to pay for it. Imperva DDoS Protection for Websites is an always-on service that immediately mitigates any type or size of DDoS attack targeting web applications. Our DDoS protection for websites complements the Imperva cloud web application firewall (WAF), which blocks hacking attempts and attacks by malicious bots. A change to your DNS records ensures that all HTTP/S traffic to your domain(s) is routed through the Imperva network. Acting as a secure proxy, Imperva DDoS protection for websites masks your origin server IP. -
17
AT&T Alien Labs Open Threat Exchange
AT&T Cybersecurity
The world's largest open threat intelligence community that enables collaborative defense with actionable, community-powered threat data. Threat sharing in the security industry remains mainly ad-hoc and informal, filled with blind spots, frustration, and pitfalls. Our vision is for companies and government agencies to gather and share relevant, timely, and accurate information about new or ongoing cyberattacks and threats as quickly as possible to avoid major breaches (or minimize the damage from an attack). The Alien Labs Open Threat Exchange (OTX™) delivers the first truly open threat intelligence community that makes this vision a reality. OTX provides open access to a global community of threat researchers and security professionals. It now has more than 100,000 participants in 140 countries, who contribute over 19 million threat indicators daily. It delivers community-generated threat data, enables collaborative research, and automates the update of your security infrastructure. -
18
Securing against unknown threats through user and entity behavior analytics. Discover abnormalities and unknown threats that traditional security tools miss. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types and threat classifications (25+) across users, accounts, devices and applications. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions.
-
19
Scuba Database Vulnerability Scanner. Download Scuba, a free tool that uncovers hidden security risks. Scan enterprise databases for vulnerabilities and misconfiguration. Know the risks to your databases. Get recommendations on how to mitigate identified issues. Available for Windows, Mac, Linux (x32), and Linux (x64), Scuba offers over 2,300 assessment tests for Oracle, Microsoft SQL, SAP Sybase, IBM DB2 and MySQL. Scuba is a free tool that scans leading enterprise databases for security vulnerabilities and configuration flaws, including patch levels, that allows you to uncover potential database security risks. It includes more than 2,300 assessment tests for Oracle, Microsoft SQL Server, SAP Sybase, IBM DB2 and MySQL. It’s possible to run a Scuba scan from any Windows, Mac or Linux client. Depending on your database size, users, groups and network connection, an average Scuba scan normally takes 2-3 minutes. No pre-installation or other dependencies are required.
-
20
Trustwave DbProtect
Trustwave
A highly scalable database security platform that enables organizations to secure their relational databases and big data stores, both on premises and in the cloud, with a distributed architecture and enterprise-level analytics. Databases contain sensitive and proprietary information, making them a prized target for cybercriminals who are constantly looking for ways to access valuable data for large financial payoffs. Trustwave DbProtect helps your business overcome resource limitations to uncover database configuration errors, access control issues, missing patches, and other weaknesses that could lead to data leakage and misuse and other serious repercussions. A real-time view of database assets, vulnerabilities, risk levels, user privileges, anomalies and incidents via a single intuitive dashboard. The ability to detect, alert and take corrective action against suspicious activities, intrusions and policy violations. -
21
It'sMe
Acceptto
Employees hate using passwords as much as you hate managing password vulnerabilities. More passwords and tokens lead to greater security risk, fatigue, and cost. It’s time to get rid of them for good. 89% of security professionals claim that a more advanced multi-factor authentication tool that provides continuous, behavioral authentication would improve their company’s security posture. Acceptto provides users with Intelligent MFA that intuitively authorizes access to applications and continues authenticating post-authorization. We prevent account takeovers, even if hackers have already acquired passwords. ItsMe™ Intelligent Multi Factor Authentication (MFA) increases your security by authorizing access attempts to a registered device in real-time, be it through a push notification or verification code (SMS, TOTP, email, and etc.). With our timed based one-time password (TOTP), security key, or biometric options, you can authenticate access even when offline. -
22
Delinea Cloud Access Controller
Delinea
Gain granular control over web applications and web-based cloud management platforms. Delinea's Cloud Access Controller provides a comprehensive PAM solution that operates at cloud speed and is quick to deploy and secure access to any web application. With Cloud Access Controller, you can easily integrate your existing authentication solutions with any web application without having to write any additional code. Apply granular RBAC policies that enforce least privilege and zero trust initiatives, even to custom and legacy web applications. Specify what an individual employee is allowed to read or modify within any web application. Grant, manage and revoke access to cloud applications. Specify who gets access to what, at a granular level. Track usage of each and every cloud application. Clientless session recording without agents. Secure access to all web applications, including social media, custom, and legacy web applications. -
23
DNSWatch
WatchGuard
WatchGuard DNSWatch is a Cloud-based service adding DNS-level filtering to detect and block potentially dangerous connections and protect networks and employees from damaging attacks. WatchGuard analysts triage any critical alerts, following up with an easy-to-understand accounting that includes detailed insights about the potential infection. When the attack uses phishing, and an employee clicks the link, DNSWatch automatically redirects them away from the malicious site and offers resources that reinforce phishing education. Hackers rely on DNS to execute attacks on unsuspecting victims, so careful examination of DNS requests is a great way to find and ultimately intercept attacks! DNSWatch brings DNS-level filtering into our Total Security Suite, providing an added layer of security to stop malware infections. Unwitting attempts to connect to known malicious DNS addresses by your users are automatically blocked, and the user is seamlessly redirected to a safe landing page. -
24
ThreatSync
WatchGuard
From distributed enterprises with 10 branch offices to small and midsize businesses (SMBs) with employees working outside of the network, it can be a struggle to manage security consistently and cohesively across your organization. It is critical for SMBs and distributed enterprise organizations to not only have visibility into both their network and endpoint event data, but to be able to quickly and efficiently leverage actionable insight to remove threats. ThreatSync, a critical component of TDR, collects event data from the WatchGuard Firebox, Host Sensor and enterprise-grade threat intelligence feeds, analyzes this data using a proprietary algorithm, and assigns a comprehensive threat score and rank. This powerful correlation engine enables cloud-based threat prioritization to empower IT team to quickly and confidently respond to threats. Collects and correlates threat event data from the Firebox and Host Sensor. -
25
Beats
Elastic
Beats is a free and open platform for single-purpose data shippers. They send data from hundreds or thousands of machines and systems to Logstash or Elasticsearch. Beats are open source data shippers that you install as agents on your servers to send operational data to Elasticsearch. Elastic provides Beats for capturing data and event logs. Beats can send data directly to Elasticsearch or via Logstash, where you can further process and enhance the data, before visualizing it in Kibana. Want to get up and running quickly with infrastructure metrics monitoring and centralized log analytics? Try out the Metrics app and the Logs app in Kibana. For more details, see Analyze metrics and Monitor logs. Whether you’re collecting from security devices, cloud, containers, hosts, or OT, Filebeat helps you keep the simple things simple by offering a lightweight way to forward and centralize logs and files.Starting Price: $16 per month -
26
Zentry
Zentry Security
Least privileged application access with consistent security for any user, anywhere. Transient authentication provides granular, least-privileged access to mission-critical infrastructure. Zentry Trusted Access provides clientless, browser-based, streamlined zero-trust application access for small to medium-sized enterprises. Organizations see gains in security posture and compliance, a reduced attack surface, and greater visibility into users and applications. Zentry Trusted Access is a cloud-native solution that is simple to configure, and even simpler to use. Employees, contractors, and third parties just need an HTML5 browser to securely connect to applications in the cloud and data center, no clients are needed. Leveraging zero trust technologies like multi-factor authentication and single sign-on, only validated users obtain access to applications and resources. All sessions are encrypted end-to-end with TLS, and each is governed by granular policies. -
27
Network Critical
Network Critical
Network Critical’s scalable and persistent visibility layer optimizes network infrastructure without compromising operations or security. Our solutions and systems are used globally across sectors. Network Critical's visibility layer feeds tools and systems data that are required to monitor and control your network. Network Critical’s scalable and persistent visibility layer feeds tools and systems the crucial network data needed to optimize, monitor, and control changing network infrastructure without compromising operations or security. Network TAPs are the base layer of smart network access and are able to monitor events on a local network. This means complete network visibility is maintained across all network security and monitoring platforms. Provides excellent performance and flexibility, needed to manage tools that are protecting network infrastructure, securing information, and keep up with the ever-changing attack environment. -
28
Keystone Accounting
GivenHansco
Keystone is the first system that truly runs concrete batch controls, dispatch, GPS vehicle tracking, and business accounting functions on one platform. Keystone handles ready mix concrete, aggregate, and asphalt companies of every size from single plant to multi-site, multi-state operations. Keystone components have a common look-and-feel for ease of use. Running off one data set assures Keystone security, functionality, versatility, and predictability. Keystone Accounting is the ONLY full financial accounting suite made expressly for ready mix concrete, aggregate, and asphalt producers and designed from the ground up for the familiar Microsoft Windows operating environment. Keystone Accounting is powerful, yet easy to use and works as a stand-alone product or as part of our integrated Keystone software suite to make your daily business and accounting process easier and more productive. -
29
HyTrust
HyTrust
In a multi-cloud world where technology moves at lightning speed and security often plays catchup, organizations face the daunting challenge of eliminating the gaps and resolving the inconsistencies in policy enforcement and adherence to compliance mandates. HyTrust CloudControl provides advanced privileged user access control, policy enforcement, forensic and automated compliance for private clouds. HyTrust DataControl provides powerful data-at-rest encryption and integrated key management for workloads running in any cloud environment. Encrypting workloads helps enterprises to ensure their data is protected. One of the challenges of workload encryption is scaling the management of encryption keys. HyTrust’s mission is to make private, public and hybrid cloud infrastructure more trustworthy for enterprises, service providers and government agencies. HyTrust provides solutions that automate security controls for software-defined computing, networking and storage workloads. -
30
Comarch Master Data Management
Comarch
Comarch Master Data Management is a central catalog of products in the cloud, ensuring effective management of product data and its exchange with business partners. The solution is GS1 certified, which means it guarantees data exchange in the GDSN (Global Data Synchronization Network). The more we know about how important for business growth effective data-sharing is, the more we realize that it is not just about how fast information is distributed among buyers and suppliers. It is also about the quality and transparency of the exchanged data. To help you synchronize your product data with all trading partners, we deliver Comarch Master Data Management - a cloud-based, GDSN certified data pool that allows you to organize, verify, manage, and maintain business-relevant information with ease. Providing each authorized party with instant access to a shared database, it guarantees real-time updates - giving you and your partners a chance to track all critical changes. -
31
Comarch Mobile Sales Force
Comarch
Comarch Mobile Sales Force application provides sales representatives with a dedicated set of tools designed to help them with their everyday tasks such as scheduling and preparing sales visits, carrying out in-store sales processes, creating detailed work plans, reporting visits/calls, and many more. Available for iOS and Android, it is a technologically advanced, ready-to-use platform that gives sales reps instant access to their customers' data - and one that allows them to better understand their clients' needs. No matter your sales channel or industry - Traditional Trade, Modern Trade, HoReCa, Pharmaceutical, Construction, or any other - Comarch Sales Force application can improve your sales effectiveness. You can count on that. The app allows you to easily schedule and register a meeting with a customer. The layout of the visit and its elements are defined by the business administrator on the client's side and adjusted to a specific client work model. -
32
Comarch Social Mining
Comarch
Bringing you closer to your customers via social networking platforms. Create new forms of online communication using modern marketing tools. Knowing why it is crucial to track and measure feedback regarding your products through social media is one thing. Doing so is a completely different story. In order to develop a successful loyalty marketing strategy, you need a powerful, and at the same time practical, solution. Only then can you strengthen the relationships with your audience via online platforms. With customers receiving dozens of product recommendations from your company on a regular basis, it is also crucial to frequently check what they actually think of those offers. This is why we make it our priority to provide you with all the necessary tools. Comarch Social Mining is a robust monitoring system that allows you to examine your customers’ product & service opinions posted via various social media channels. -
33
Comarch Business Intelligence
Comarch
A robust Business Intelligence platform for advanced analysis of customer loyalty data. Make better business decisions while managing your loyalty programs and marketing campaigns. According to the latest market reports, growing companies generate around 30-50% more data each year. Not only do such outcomes require the right organization of the IT infrastructure and software, but also, what is most critical in loyalty marketing, they make us redefine how we gather our data and how we process and analyze that information. To help companies of all sizes and industries use data effectively and build successful and engaging loyalty programs, we provide them with Comarch Business Intelligence - an advanced analytical and reporting platform for monitoring and optimizing both loyalty programs and marketing campaigns. -
34
Motiva AI
The Data Guild
Motiva AI saves teams hundreds of hours per year in labor while it improves your entire marketing practice, from audience definition and discovery to messaging optimization to funnel performance. Based on a proprietary machine learning engine, Motiva AI is a powerful new member of any team, automatically finding and executing strategies that most resonate with your target audience. Motiva AI is now moving into healthcare to deliver adaptive patient experiences in clinical trials and healthcare programs. Define an audience and any number of variations of messaging, and Motiva AI executes your best campaign for you. Motiva AI learns by listening deeply to your customers and understanding what moves them. Motiva AI organically adapts campaign strategy based on customer behaviors for the best possible results, on its own. Quit spending time on repeated, low-value tasks. Let Motiva AI take care of figuring out which user should get which message for best campaign performance. -
35
Comarch Wealth Management
Comarch
Comarch Wealth Management is an integrated, multi-module platform which lets you give the finest investment advice to all your clients, no matter who they are, and how they change. Recommend next steps in minutes. Stay reachable. Build relationships that last. We've built our system to guide advisors and clients to the right investment decisions, step by step. No matter how many clients you have, which segment they belong to, or how experienced your advisors are, you will keep your service at the highest level. Better yet, it will take you less time than you think. It only takes a glance to have a full client investment picture - and that means you can give accurate recommendations within one meeting. Also, you'll be much easier to get in touch with. Think client app, online meetings, shared investment ideas, and more. But what really counts, is that you'll find it easier to keep your finger on the pulse. -
36
DX Virtual Network Assurance
Broadcom
DX Virtual Network Assurance extend visibility and ensure reliability of SDN/NFV networks with network monitoring tools by CA Technologies, a Broadcom company. A converged NetOps portal is required in order to successfully deploy modern network architectures. You can use these network monitoring tools to enable seamless management of traditional and advanced technologies like SDN, NFV, SDDC, SD-WAN and the cloud in a one-dashboard experience. Advanced visualizations of complex Cisco ACI environments provide deployment assurance and on-going health awareness. With our network monitoring tools, you can visualize the new network abstraction via discovery and mapping of your Cisco ACI deployments, along with traditional infrastructure. Close the loop among traditional physical network environments and new virtualized networking technologies to reduce complexity in network visibility and planning. -
37
Cisco SD-Access
Cisco
A more secure and agile network for your modern enterprise. Your IT operations can be more efficient, your network more secure, and your user experience more consistent across wired, wireless, and VPN infrastructure with our advanced solution for automating user policy and network access. Cisco SD-Access, a solution within Cisco DNA, defines a uniform policy-based network fabric that meets business needs with security, automation, and assurance. SD-Access augments the Cisco DNA Center capabilities of automation and assurance. It also provides a software-defined approach for network segmentation, critical for establishing a zero-trust network. Use AI- and ML-based advanced analytics for endpoint identification and grouping. Analyze traffic flows between groups, and define effective access policies. Apply group-based access policies for effective multilevel segmentation, leading to zero-trust security. -
38
Webex Assist
Webex by Cisco
Provide high-quality remote video interactions at any time, anywhere, and on any device. Provide secure video appointments between patients and clinicians. Empower customer service agents to engage and support customers through live video. Enable effective collaboration between field workers and experts using video. Support appointment-driven and instant one-to-one real-time video interactions. Deliver a seamless experience with reminders, one-click invites, and more. Maintain data security with end-to-end encryption that is fully compliant with GDPR and HIPAA regulations. Record sessions to provide full audit trails. Guarantee a great experience with video that adapts to poor network conditions. Automatically fallback to audio to keep the conversation going without interruption. Provide assistance seamlessly across devices, operating systems, and browsers. Remove the need for any downloads or software installations to start connecting with ease. -
39
Medigate
Medigate
Healthcare’s Security and Clinical Analytics Company. #1 IoT device security solution designed for Healthcare. Medigate has invested in building out the largest medical device and protocol database so you can have the most detailed device inventories and accurate threat detection available. Medigate offers the industry’s only truly dedicated medical device security platform that identifies and protects all Internet of Medical Things (IoMT) devices connected to a healthcare provider’s network. Unlike general IoT solutions, we’ve built our cyber security platform specifically and only for the unique needs of medical devices and clinical networks. Our solution safeguards clinical networks from all angles by providing complete visibility into all connected medical devices to identify risk based on clinical context, detect anomalies according to manufacturers’ protocols and actively block malicious activities by integrating into your existing firewalls or NAC. -
40
SpyCloud
SpyCloud
After a data breach, criminals quickly monetize the data, often by using stolen credentials to gain easy access to consumer accounts and corporate systems. If your employees, consumers, or third-parties have credentials or PII exposed in a data breach, they are at high risk of account takeover fraud. SpyCloud can help you prevent account takeover and combat online fraud with proactive solutions that leverage the largest repository of recovered breach assets in the world. Reset stolen passwords before criminals can use them to defraud your users or access sensitive corporate data. Draw on decades-worth of digital breadcrumbs to unmask criminals attempting to defraud your business and your customers. Monitor your critical third party relationships for supply chain breach exposures that could endanger your enterprise. Leverage breach data to protect employees, citizens and your supply chain from credential-based cyber attacks. -
41
The Respond Analyst
Respond
Accelerate investigations and improve analyst productivity with a XDR Cybersecurity Solution. The Respond Analyst™, an XDR Engine, automates the discovery of security incidents by turning resource-intensive monitoring and initial analysis into thorough and consistent investigations. Unlike other XDR solutions, the Respond Analyst connects disparate evidence using probabilistic mathematics and integrated reasoning to determine the likelihood that events are malicious and actionable. The Respond Analyst augments security operations teams by significantly reducing the need to chase false positives resulting in more time for threat hunting. The Respond Analyst allows you to choose best-of-breed controls to modernize your sensor grid. The Respond Analyst integrates with the leading security vendor offerings across important categories such as EDR, IPS, Web Filtering, EPP, Vulnerability Scanning, Authentication, and more. -
42
ARIA SDS Packet Intelligence
ARIA Cybersecurity Solutions
The ARIA Packet Intelligence (PI) application gives OEMs, service providers, and security professionals a better way to use SmartNIC technology to support two important use cases: advanced packet-level network analytics and cyber-threat detection, response, and containment. Network analytics: ARIA PI provides complete visibility into all network traffic and feeds valuable analytics data to packet delivery accounting tools, quality of service systems, and SLA monitoring applications. All of this helps companies provide better service and maximize revenues tied to usage-based billing. Cyber-threat detection, response, and containment: ARIA PI also feeds metadata to threat detection tools for complete visibility into all network traffic, including east-west data flows. This improves the effectiveness of existing security solutions, such as SIEMs and IDS/IPS tools, and gives security teams a better way to detect, respond, contain, and remediate even the most advanced cyber threats. -
43
CYBERShark
CYBERShark
CYBERShark takes BlackStratus’ proven security and compliance platform, trusted by thousands of customers, and delivers it at a fraction of the cost in the cloud. Build a sustainable SOC-as-a-service business without investing in expensive infrastructure. By white-labeling the CYBERShark service, you benefit from all the capabilities of complex hardware appliances and security analysts without the maintenance and labor costs. Help your customers reduce risk, respond to threats faster, achieve compliance and ensure continuity with CYBERShark. Cybersecurity is more important than ever before in our data-driven world. More than 60 percent of small businesses close within six months of experiencing a data breach due to exorbitant financial losses, and even large corporations experience breaches on an annual basis. For many small businesses, the solution is cloud security service programs like CYBERShark. -
44
EditShare
EditShare
By removing complexity, our innovative range of products improve production workflows and free media professionals to unleash their creativity. EditShare drives your entire workflow, from ingest to archive, with collaborative storage and media management solutions. Our EFSv cloud platform lets your teams work on any project, from any location, all at the same time. We work closely with our industry partners to provide seamless integration with your tools of choice. We’ll work with your team to determine a recommended product suite, so you can get a firsthand look at our integrated workflow solutions. Companies around the world have been using EditShare solutions for more than 15 years. Take a look at some of their amazing work. Creative Storytelling Made Easier with EditShare. Free to choose your own creative toolset as well as a full set of RESTful APIs enabling you to support workflows to suit your needs. -
45
RapidScale Identity as a Service
RapidScale
RapidScale’s Identity as a Service (IDaaS) is ideal for organizations wrestling with making network access easy for staff, without compromising security. Built on the backbone of Azure Active Directory, our IDaaS solution provides potent security out of the box. Protect your critical data and applications no matter where they’re located – in cloud, hosted or on-premises environments. We have options supporting single sign-on (SSO), multi-factor authentication (MFA), password synchronization, and much more. It’s easy to make your login security even stronger with our options for identity services. Employ advanced password sync functions like user password reset and changing, writeback and more, along with a wealth of other services so you can control access more finitely. It’s easy to manage your IDaaS services through our full-service portal, along with your other RapidScale solutions. Alternately, let us manage your IDaaS deployment for you. -
46
Acceptto Zero Trust Identity (CIAM)
Acceptto
You need to know that your customers are who they say they are, customers don’t want to jump through hoops to prove it and they want you to keep their credentials safe. Protect your customers identities through a delicate balance of security and a frictionless, pleasant customer experience. Real-time, continuous identity monitoring & validation Post-Authorization. Eliminate account takeover (ATO) instantly with intelligent MFA. Risk-based policy orchestrated continuous authentication. Acceptto is a transformative cybersecurity company driving a paradigm shift in identity access management by treating authentication not as a single event, but rather a continuum. Our AI/ML powered Passwordless Continuous AuthenticationTM technology analyzes and verifies user identity, inferring behavioral data to detect anomalies and eliminate dependence on vulnerable binary authentications. We deliver the smartest, most resilient and breach-proof identity validation technology. -
47
BlueCat Gateway
BlueCat
Provide self-service capabilities to end users making IT more accessible across the enterprise. Access a robust automation library that facilitates complex automation tasks and integrates with 3rd party solutions to extend the value of existing solutions. Automate the stand-up and tear-down of cloud and on-premises resources, enabling IT to respond faster to requests. Extend visibility from the data center to the cloud through discovery and continuous synchronization of cloud-based IP and DNS-resources. Reduce time to remediate problems and shorten investigations by automating the reconciliation of IP addresses and DNS records. Accelerate application delivery and eliminate outages, with centralized management and integration with native DNS and IP configuration services in public clouds. Align custom network emergency plans with flexible control over manual or automated DNS failover. -
48
MindSafe
Atlantix Global
When it’s time to retire your IT hardware there’s an entirely new risk to your data. Don’t overlook this critically important step in any IT project. We safeguard your data with our leading-edge erasure and destruction services that meet the most rigorous industry standards. Atlantix employs the industry’s largest team of technical engineers to handle your data security needs. With expertise across all major platforms and manufacturers (Dell EMC, NetApp, HPE, IBM, Cisco, and more), we deploy a compliant sanitization protocol without degrading the value of your IT assets. Atlantix evaluates your assets and determines the best course of action, data erasure, degaussing or shredding. Our process includes a full audit and tracking through serial number capturing to ensure your products are secure. MindSafe erasure services are performed when your products are in good condition and considered as equipment for reuse, redeployment, or remarketing. -
49
AspenPLUS
AspenPLUS
Built with our customers in mind, to save you time and money, aspenPLUS is the easiest way to manage your IT procurement online with the added benefit of having a dedicated account manager. 24/7 stock availability and pricing with thousands of products from the world’s biggest technology brands and exclusive pricing, all in one easy-to-use portal. Bespoke and pre-approved product bundles to suit your business, reducing errors and processing time. Save time and reduce errors, use our configurators to ensure you are getting the right toner, memory, batteries, and adapters. Manage all invoicing, reporting, IT purchasing, and returns with support from your dedicated account manager. Our exclusive aspenPLUS shop has thousands of products from the best IT brands. Order on account or pay online, view existing invoices, initiate returns, request assistance, and create custom bundles for your business needs. -
50
New Era
New Era Technology
Facilitate modern workplaces with world-class collaboration and unified communication services. New Era provides communication solutions that streamline and integrate a vast array of collaboration and UC technologies, including audio visual technology, telephony, audio conferencing, web conferencing, video conferencing, unified messaging, instant messaging, digital signage, and more. We offer a complete end-to-end managed service for your entire unified collaboration environment. By empowering organizations to support their users from any location and device, we help drive productivity and achieve better business outcomes, ensuring users get the very best collaboration experience, enabling them to operate effectively regardless of whether they sit on-site or remote. Our vendor-agnostic approach allows us to integrate and manage multiple vendors and collaboration technologies. Let’s build a personalized service to meet your company’s communication needs.