22 Integrations with Comarch Mobile Sales Force

View a list of Comarch Mobile Sales Force integrations and software that integrates with Comarch Mobile Sales Force below. Compare the best Comarch Mobile Sales Force integrations as well as features, ratings, user reviews, and pricing of software that integrates with Comarch Mobile Sales Force. Here are the current Comarch Mobile Sales Force integrations in 2024:

  • 1
    Microsoft 365

    Microsoft 365

    Microsoft

    Introducing Microsoft 365 (formerly Microsoft Office 365). Be more creative and achieve what matters with Outlook, OneDrive, Word, Excel, PowerPoint, OneNote, SharePoint, Microsoft Teams, Yammer, and more. With a Microsoft 365 subscription, you get the latest Office apps—both the desktop and the online versions—and updates when they happen. On your desktop, on your tablet, and on your phone.* Microsoft 365 + your device + the Internet = productivity wherever you are. OneDrive makes the work you do available to you from anywhere—and to others when you collaborate or share. Help at every turn. Email, chat, or call and talk to a real live person. Get Office today—choose the option that's right for you
    Leader badge
    Starting Price: $5 per user per month
  • 2
    IBM Cloud
    IBM Cloud® capabilities enable business agility and resiliency. Explore the platform that gives you 2.5x value. Designed for industry, security and the freedom to build and run anywhere. Business workflow transformation with automation and AI. Strong technology partner ecosystem that delivers value for industry needs. Industry and business domain expertise and solutions. Automated and auditable processes. Unique capabilities for the highest levels of cloud security and monitoring. Consistent security and controls posture across all applications. Containerized capabilities for DevOps, automation, data and security. Ease of integration and a consistent application development lifecycle. Advanced technologies including IBM Watson®, analytics, IoT, and edge.
  • 3
    Palo Alto Networks NGFW

    Palo Alto Networks NGFW

    Palo Alto Networks

    Our ML-Powered NGFW physical appliances enable you to stay ahead of unknown threats, see everything, including IoT, and reduce errors with automatic policy recommendations. VM-Series, the virtualized version of our ML-Powered NGFW, protects your private and public cloud deployments with segmentation and proactive threat prevention. CN-Series, the containerized version of our ML-Powered NGFW, prevents sophisticated network-based threats from spreading across Kubernetes namespace boundaries.
  • 4
    Cisco ACI
    Achieve resource elasticity with automation through common policies for data center operations. Extend consistent policy management across multiple on-premises and cloud instances for security, governance, and compliance. Get business continuity, disaster recovery, and highly secure networking with a zero-trust security model. Transform Day 2 operations to a more proactive model and automate troubleshooting, root-cause analysis, and remediation. Optimizes performance, and single-click access facilitates automation and centralized management. Extend on-premises ACI networks into remote locations, bare-metal clouds, and colocation providers without hardware. Cisco's Multi-Site Orchestrator offers provisioning and health monitoring, and manages Cisco ACI networking policies, and more. This solution provides automated network connectivity, consistent policy management, and simplified operations for multicloud environments.
  • 5
    Airstack

    Airstack

    Lenovo

    Get your teams and tools on the same page. Airstack makes it easy for teams to organize and share digital tools across the business, so everyone can get visibility into what apps you have and how to use them. Organize your digital tools into an internal app catalog or stacks to share with others. Airstack will automatically pull in logos, links and descriptions for tens of thousands of apps. Get everyone on the same page about your tech by inviting them to see what you have, and share what they have with others. Add everything you need to know about any app - SaaS subscription management data, employee training, links to reports, video walkthroughs. All that critical expertise now has a home. Airstack gets better as more and more teams join in. Get total visibility into what's in your tech stack - kind of like an org chart for your software.
    Starting Price: $99 per user per month
  • 6
    ArcGIS
    Mapping and analysis, location intelligence for everyone. Part of the Esri Geospatial Cloud, ArcGIS Online enables you to connect people, locations, and data using interactive maps. Work with smart, data-driven styles and intuitive analysis tools that deliver location intelligence. Share your insights with the world or specific groups. Build interactive maps that explain your data and encourage users to explore. Map your own data and gain perspective by adding the authoritative location-based data included in ArcGIS Online. Use smart mapping to guide your data exploration and visualization. Share your maps with specific groups or everyone. Create web apps with your maps for a focused, interactive experience. Then integrate the apps you built into your digital presence including your website, social media posts, and blog articles.
    Starting Price: $100 per year
  • 7
    Alvaria Workforce
    Optimize labor costs, manage capacity more effectively and improve service levels with the Alvaria workforce management and optimization solutions. Maximizing contact center efficiency is critical to delivering great customer experience while minimizing operating costs. From precision volume forecasting to mobile schedule management, optimal seat utilization and beyond, Alvaria Workforce provides the solutions you need to ensure you have the right agents in place at the right time to deliver superior customer service. Core call center workforce optimization and management components include potent tools for forecasting, tracking and scheduling the workforce. These tools are essential in getting the right agents with the necessary skills, in the right seats, at the right time.
  • 8
    Dell EMC NetWorker

    Dell EMC NetWorker

    Dell Technologies

    Use Dell EMC NetWorker software for unified backup and recovery of your enterprise applications and databases. With centralized administration, NetWorker helps you take advantage of the data protection that fits your needs best: deduplication, backup to disk and tape, snapshots, replication, and NAS. NetWorker protects both physical and virtual environments including VMware and Microsoft Hyper-V. Whether you’re protecting applications and data residing within your data center or the public cloud, NetWorker provides the same enterprise-level user experience. With cloud capabilities, NetWorker offers a solution for cloud data protection with optimizations to secure your data everywhere. NetWorker is available as virtual edition or as a component of the Dell EMC Data Protection Suite, which offers you a complete suite of data protection software options.
  • 9
    HPE Consumption Analytics

    HPE Consumption Analytics

    Hewlett Packard Enterprise

    The HPE Consumption Analytics Portal is now the metering and analytics component of HPE GreenLake, the consumption-based IT offering from HPE Pointnext Services that gives you the agility and economics of the public cloud in your own data center. Get granular visibility into your usage and costs with interactive dashboards and a drag-and-drop report experience. Stay on top of IT spending with flexible budgets and a rules-based recommendation engine for consumption-based services. Forecast demand to prevent a shortage from becoming an outage with decision-making power to plan your capacity. he HPE Consumption Analytics Portal is part of HPE GreenLake, delivering even more transparency into how your usage and commitments determine your monthly cost. Get more decision-making power to plan your capacity for best workload performance.
  • 10
    Citrix ADC

    Citrix ADC

    Citrix Systems

    Citrix ADC is the most comprehensive application delivery and load balancing solution for monolithic and microservices-based applications. Which means you can deliver a better user experience, on any device—anywhere. A single code base across the Citrix ADC portfolio gives you greater agility and speed by providing operational consistency and holistic visibility across multi-cloud with a single pane of glass. From on premises to the cloud—and everything in between.
  • 11
    OnAvaya

    OnAvaya

    Avaya

    The product-based Avaya Diagnostics & Tools tab will link you to both product-diagnostic tools and Web Site administration tools You will also find tools specifically designed for the product you selected. Deploying OnAvaya™ and Powered by Avaya IP Office and IP Office Contact Center For Business Partners.
  • 12
    EGrAMS

    EGrAMS

    HTC Global Services

    Managing a grant lifecycle can be tedious, time-consuming, and also stressful, given the frequent changes in requirements and regulations. But a comprehensive and easy-to-use solution can make the task of grants management lighter.HTC’s EGrAMS (Electronic Grants Administration and Management System) is just that solution. It is a web-based, enterprise-grade, end-to-end grants administration, and management solution that handles all phases of the grants lifecycle for grantors, with a powerful reporting facility for grantees. EGrAMS improves transparency and accountability by tracking performance in real-time and automatically sending notifications and alerts. Grantors can set up review criteria, score rubrics, collaborate and review for consensus, generate rank lists, and funding recommendations. EGrAMS enables grantors to take charge of the entire grants lifecycle and improve outcomes.
  • 13
    Symantec Advanced Authentication
    Mitigate threats and stimulate growth with Advanced Authentication solutions from Symantec. Get real-time protection for your online and mobile applications. Our leading-edge solution can authenticate an employee, partner or contractor while providing a frictionless login experience. This ensures that legitimate users have anytime, anywhere access from any device, which builds trust and brand loyalty. Get a flexible, scalable solution with both strong multi-factor authentication and risk-based methods like device identification, geolocation and user activity. Catastrophic cyber attacks are happening every day. We make sure you’re prepared to defend your business. Earn customer trust and loyalty by providing the simple, seamless experience they’re looking for. With the right data, you can more easily distinguish between legitimate and fraudulent behavior.
  • 14
    Veritas NetBackup

    Veritas NetBackup

    Veritas Technologies

    Optimized for the multicloud, extensive workload support, and ensured operational resiliency. Ensure data integrity, monitor your environment, and recover at scale to optimize your resilience. Resiliency. Migration. Snapshot orchestration. Disaster recovery. Unified, end-to-end deduplication. One solution manages it all. The most VMs protected, recovered, and moved to the cloud. Protect VMware, Microsoft Hyper-V, Nutanix AHV, Red Hat Virtualization, AzureStack and OpenStack with automated protection and instant access to VM data via flexible recovery. At-scale disaster recovery with near-zero RPO and RTO. Protect your data with 60+ public cloud storage targets, an automated, SLA-driven resiliency platform, and a new supported integration with NetBackup. Get scale-out protection for petabyte-scale workloads with hundreds of data nodes. Use NetBackup Parallel Streaming, a modern parallel streaming agentless architecture.
  • 15
    Oracle Cloud Infrastructure
    Oracle Cloud Infrastructure supports traditional workloads and delivers modern cloud development tools. It is architected to detect and defend against modern threats, so you can innovate more. Combine low cost with high performance to lower your TCO. Oracle Cloud is a Generation 2 enterprise cloud that delivers powerful compute and networking performance and includes a comprehensive portfolio of infrastructure and platform cloud services. Built from the ground up to meet the needs of mission-critical applications, Oracle Cloud supports all legacy workloads while delivering modern cloud development tools, enabling enterprises to bring their past forward as they build their future. Our Generation 2 Cloud is the only one built to run Oracle Autonomous Database, the industry's first and only self-driving database. Oracle Cloud offers a comprehensive cloud computing portfolio, from application development and business analytics to data management, integration, security, AI & blockchain.
  • 16
    VMware Cloud
    Build, run, manage, connect and protect all of your apps on any cloud. The Multi-Cloud solutions from VMware deliver a cloud operating model for all applications. Support your digital business initiatives with the world’s most proven and widely deployed cloud infrastructure. Leverage the same skills you use in the data center, while tapping into the depth and breadth of six global hyperscale public cloud providers and 4,000+ VMware Cloud Provider Partners. With hybrid cloud built on VMware Cloud Foundation, you get consistent infrastructure and operations for new and existing cloud native applications, from data center to cloud to edge. This consistency improves agility and reduces complexity, cost and risk. Build, run and manage modern apps on any cloud, meeting diverse needs with on-premises and public cloud resources. Manage both container-based workloads and traditional VM-based workloads on a single platform.
  • 17
    Fortinet SD-WAN
    Fortinet is the fastest-growing SD-WAN provider in market share by revenue. Fortinet SD-WAN delivers advanced routing, self-healing capabilities, and flexible security using network firewall or SASE-based cloud-delivered services—all in a single, integrated solution. Fortinet Secure SDWAN (software-defined wide-area network) solution enables enterprises to transform and secure all WAN edges. Leveraging the Security-driven Networking approach that uses one operating system and one centralized management console, enterprises realize superior user experience, enhanced security posture effectiveness with converged networking and security, and achieve operational continuity and efficiency. Fortinet Secure SD-WAN is designed to address modern complexity and threat exposure to support customers critical business needs. It is designed to evolve to future-proof and protect investments as customers embrace a digital-first journey and support work-from-anywhere.
  • 18
    Trend Micro Endpoint Encryption
    Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.
  • 19
    Huawei FusionStorage

    Huawei FusionStorage

    Huawei Technologies

    Huawei FusionStorage fully converged cloud storage features massive scale-out capabilities designed for cloud-based architectures. The on-board storage system software combines the local storage resources of standard x86 servers into fully distributed storage pools, allowing a single system to provide block, file, and object storage services to the upper layer. An enterprise can easily obtain the flexibility and efficiency in data storage required to keep up with the ever-changing dynamics of business. Convergence of multiple storage services: Distributed block, file, and object storage services are now fully converged onto one platform with unified hardware and shared resources, simplifying O&M. On-demand resources: Automatic data services and on-demand application-oriented storage resource supplies reduce business TTM from one week to one hour.
  • 20
    Check Point Quantum

    Check Point Quantum

    Check Point Software Technologies

    Cyber threats are becoming more sophisticated and harder to detect. Check Point Quantum Network Security provides ultra-scalable protection against Gen V cyber attacks on your network, cloud, data center, IoT and remote users. Check Point Quantum Next Generation Firewall Security Gateways™ combine SandBlast threat prevention, hyper-scale networking, a unified management platform, remote access VPN and IOT security to protect you against the most sophisticated cyber attacks. Delivers the highest-caliber threat prevention with award winning SandBlast Zero Day protection out of the box. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. Integrating the most advanced threat prevention and a consolidated management, our security gateway appliances are designed to prevent any cyber attack, reduce complexity and lower your costs.
  • 21
    Juniper Booking Engine
    Juniper, your tourism technology partner with the best online solutions that adapt to your business. It is a complete and robust tool, but also flexible: its modular system allows maximum adaptation to the expectations of your company and its turnover. The XML connectivity offered by Juniper is the most extensive in the market, putting at your disposal more than 350 integrations with tourism product suppliers via Webservice. Confirm reservations, make promotions and send the travel voucher to your traveler or your clients, among many other possibilities. Update availability, change prices, sell complementary products, organize the contents of sales channels and package different products dynamically. Manage Yield Management tools, adjust prices and offers according to market conditions. Offer on your website your own product and / or that of external suppliers simultaneously, allowing your customers to choose from a greater variety of product.
  • 22
    Red Hat Cloud Suite
    Red Hat® Cloud Suite provides a container-based application development platform, built on massively scalable cloud infrastructure, all managed through a common management framework. Customers can move existing workloads to scale-out cloud infrastructure and accelerate new cloud-based services for private cloud and application development. With Red Hat Cloud Suite, the operations team can deliver public cloud-like services to developers and the business while maintaining control and visibility. Key product advantages include: Integrated components — Tightly integrated, fully supported components that act in concert to provide an open hybrid cloud. Unified management — A single management framework across infrastructure and application development layers, plus complete operation and life cycle management with proactive risk mitigation. Full-featured application development and containers — Flexible container-based application development abilities via OpenShift Enterprise
  • Previous
  • You're on page 1
  • Next