13 Integrations with IBM z/OS

View a list of IBM z/OS integrations and software that integrates with IBM z/OS below. Compare the best IBM z/OS integrations as well as features, ratings, user reviews, and pricing of software that integrates with IBM z/OS. Here are the current IBM z/OS integrations in 2024:

  • 1
    RunMyJobs by Redwood

    RunMyJobs by Redwood

    RunMyJobs by Redwood

    RunMyJobs by Redwood is the #1 SaaS enterprise workload automation platform built for ERP that automates end-to-end processes in complex environments, on-prem or in the cloud. With a guaranteed 99.95% uptime and 24/7 support, you can run processes reliably and eliminate hosting costs. Companies can maintain a clean core and ensures no process disruptions during multiphase RISE migrations with seamless integration with SAP S/4HANA, BTP applications, legacy ECC and 1,000 pre-built SAP templates and connectors. Enjoy unparalleled freedom to connect to unlimited servers, applications, and environments, from modern SaaS solutions to legacy systems. Build automations faster with a low-code, drag-and-drop visual editor and an extensive library of templates and wizards. Monitor every process from a single pane of glass with real-time visibility. Receive early warnings and configure alerts of potential issues to address them before they impact operations.
    Leader badge
    View Software
    Visit Website
  • 2
    Red Hat OpenShift
    The Kubernetes platform for big ideas. Empower developers to innovate and ship faster with the leading hybrid cloud, enterprise container platform. Red Hat OpenShift offers automated installation, upgrades, and lifecycle management throughout the container stack—the operating system, Kubernetes and cluster services, and applications—on any cloud. Red Hat OpenShift helps teams build with speed, agility, confidence, and choice. Code in production mode anywhere you choose to build. Get back to doing work that matters. Red Hat OpenShift is focused on security at every level of the container stack and throughout the application lifecycle. It includes long-term, enterprise support from one of the leading Kubernetes contributors and open source software companies. Support the most demanding workloads including AI/ML, Java, data analytics, databases, and more. Automate deployment and life-cycle management with our vast ecosystem of technology partners.
    Starting Price: $50.00/month
  • 3
    IBM Cloud
    IBM Cloud® capabilities enable business agility and resiliency. Explore the platform that gives you 2.5x value. Designed for industry, security and the freedom to build and run anywhere. Business workflow transformation with automation and AI. Strong technology partner ecosystem that delivers value for industry needs. Industry and business domain expertise and solutions. Automated and auditable processes. Unique capabilities for the highest levels of cloud security and monitoring. Consistent security and controls posture across all applications. Containerized capabilities for DevOps, automation, data and security. Ease of integration and a consistent application development lifecycle. Advanced technologies including IBM Watson®, analytics, IoT, and edge.
  • 4
    Kobee

    Kobee

    Kobee

    When you need full control, complete insight and an automated CI/CD toolchain that simply works for your enterprise environment. Each project can have multiple life cycles. Each life cycle provides a customizable workflow for automating the activities required to move back and forth in the development/release process. The framework supports Release and Package-based builds (Distributed and Mainframe). You can have continuous integration (CI), scheduled or forced builds. Once the release is built, it is stored as an archive for later use. Build types supported: Full Build, Partial Build, Production-based Partial Build, or tag-based Partial Build. The automated deployment process moves the release or package to the appropriate Test or Production environment. For each solution a dedicated set of pre-defined but customizable actions is used (we call these: "Solution Phases") to automate this process.
    Starting Price: $45 per month
  • 5
    Tectia

    Tectia

    SSH Communications Security

    We are a cybersecurity company dedicated to safeguarding mission-critical data in transit, in use, and at rest for leading organizations around the world. Assess your SSH key estate and related SSH key risks with our self-service tool SSHerlock. SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool and can be used free of charge. Passwordless authentication, operational technology (OT) security, defensive cybersecurity, and more. What are the top trends that will shape cybersecurity in the upcoming year? PrivX is perfect for securing, managing and tracking superuser and power user access in the hybrid cloud - by also eliminating risky privileged passwords from critical infrastructures. UKM Zero Trust manages and automates the lifecycle of millions of encryption keys for risk mitigation and audit success - also by making access keyless. Software-based NQX features matchless performance and security.
  • 6
    C++

    C++

    C++

    C++ is a simple and clear language in its expressions. It is true that a piece of code written with C++ may be seen by a stranger of programming a bit more cryptic than some other languages due to the intensive use of special characters ({}[]*&!|...), but once one knows the meaning of such characters it can be even more schematic and clear than other languages that rely more on English words. Also, the simplification of the input/output interface of C++ in comparison to C and the incorporation of the standard template library in the language, makes the communication and manipulation of data in a program written in C++ as simple as in other languages, without losing the power it offers. It is a programming model that treats programming from a perspective where each component is considered an object, with its own properties and methods, replacing or complementing structured programming paradigm, where the focus was on procedures and parameters.
    Starting Price: Free
  • 7
    IBM Z

    IBM Z

    IBM

    In an age of innovation and accelerating change, organizations demand portability and flexibility as they modernize their applications and IT infrastructure. IBM® Z® hardware and software deliver an open, cloud-native experience, plus the AI, resiliency, and security you need. Consistently build AI-powered applications and deploy them anywhere. Rely on hardware and software designed to protect your data and applications. Get pricing options tailored to your business and IBM Z environment.
  • 8
    IBM LinuxONE
    Build AI-infused services that are developed and deployed anywhere across your cloud. Extend data privacy from LinuxONE to your enterprise through the use of policy controls. Minimize the impact of internal and external attacks by isolating workloads to ensure continuous service. Use open servers designed for both start-ups and enterprises, as well as for public, private or hybrid cloud. Flexibility, responsiveness and cost are fueling your digital transformation and your journey to hybrid cloud. Now, you can drive to market faster—while avoiding cloud security risks and complex migration challenges. LinuxONE III can transform your application and data portfolio with innovative data privacy, security and cyber resiliency capabilities—all delivered with minimal downtime. Manage data and transactions at massive scale and respond to changing requirements on demand.
  • 9
    IntelliMagic Vision for z/OS
    Most RMF/SMF data analysis involves static reports that are difficult and expensive to maintain, require years to learn proficiently, and create expertise silos amongst teams. IntelliMagic Vision’s customizable reports and unprecedented depth of built-in z/OS intelligence allow analysts to identify unseen risks, tune workloads for significant cost savings, multiply the impact of experts, and accelerate training and effectiveness of new staff. Optimize z/OS Systems performance management using AI-driven analytics to proactively monitor and manage your z/OS environment, prevent disruptions, reduce costs, and preserve the reliability and availability that mainframes are known for. Reduce cost with superior visibility into drivers of cost such as inefficient CPU utilization, configuration and priority issues, imbalance of workloads across hardware resources, consolidation opportunities, etc.
  • 10
    PK Protect

    PK Protect

    PKWARE

    Automate the DSAR response process to meet requirements faster and on budget. Find data that can and/or should legally be archived or deleted due to age or lack of use. Create rules that will delete or redact sensitive data as soon as it is found. Detect and confirm breaches with monitoring, then accurately estimate and report on the breach’s impact. Enable pseudonymization, anonymization, and de-identification of private personal data. Continuously monitor endpoints, servers, and enterprise solutions for privacy data. Organizations are required to keep up with the ever-changing privacy landscape and protect personally identifiable information they interact with. PK Privacy gives organizations the power to automate data discovery and reporting mechanisms to assist with reducing the operational complications of privacy legislation. Once PK Privacy discovers data, it can automatically encrypt, mask, redact, delete, or otherwise remediate personal information.
  • 11
    IBM Wazi for Dev Spaces
    IBM Wazi for Dev Spaces provides a modern experience for mainframe software developers working with z/OS applications in the cloud. Powered by the open source projects Zowe™ and Red Hat OpenShift Dev Spaces, IBM Wazi for Dev Spaces offers an easy, streamlined onboarding process to provide mainframe developers with the tools they need. Using container technology, IBM Wazi for Dev Spaces brings the necessary tools to the task at hand. It provides a single-click developer workspace and eliminates local environment configuration. IBM Wazi for Dev Spaces devfile registry is a web service that provides a list of Wazi for Dev Spaces stacks to create ready-to-use workspaces. The list of stacks is used in the quick add, CodeReady Dashboard. A devfile stack contains the definitions for an application developer workspace based on devfile specifications.
  • 12
    IBM Wazi as a Service
    IBM Wazi aaS also provides experimental capabilities to enable customers to get started with exploring IBM Cloud’s Continuous Delivery offering through Integration templates based on DevSecOps practices. The service offers a unified user experience for z/OS and cloud-native applications in the IBM Cloud to create and use toolchains, with security and audibility at its core. Accelerate delivery through rapid development and testing enabled by on-demand access to a z/OS environment in less than 5 minutes. Innovate faster in response to ever-changing business needs by using a z/OS system that includes the latest and greatest software. Enhance software quality and audibility by shifting left automating your testing and considering security earlier in the development lifecycle. Help developers and systems programmers by eliminating wait times and enabling easy deployment of a z/OS system with Wazi Image Builder using standard or custom images.
  • 13
    C

    C

    C

    C is a programming language created in 1972 which remains very important and widely used today. C is a general-purpose, imperative, procedural language. The C language can be used to develop a wide variety of different software and applications including operating systems, software applications, code compilers, databases, and more.
  • Previous
  • You're on page 1
  • Next