24 Integrations with Intel Data Center Manager

View a list of Intel Data Center Manager integrations and software that integrates with Intel Data Center Manager below. Compare the best Intel Data Center Manager integrations as well as features, ratings, user reviews, and pricing of software that integrates with Intel Data Center Manager. Here are the current Intel Data Center Manager integrations in 2024:

  • 1
    Telegraf

    Telegraf

    InfluxData

    Telegraf is the open source server agent to help you collect metrics from your stacks, sensors and systems. Telegraf is a plugin-driven server agent for collecting and sending metrics and events from databases, systems, and IoT sensors. Telegraf is written in Go and compiles into a single binary with no external dependencies, and requires a very minimal memory footprint. Telegraf can collect metrics from a wide array of inputs and write them into a wide array of outputs. It is plugin-driven for both collection and output of data so it is easily extendable. It is written in Go, which means that it is a compiled and standalone binary that can be executed on any system with no need for external dependencies, no npm, pip, gem, or other package management tools required. With 300+ plugins already written by subject matter experts on the data in the community, it is easy to start collecting metrics from your end-points.
    Starting Price: $0
  • 2
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.
  • 3
    Boon

    Boon

    Boon

    Boon is the Top Employee Referral Software. An intuitive platform that lets companies automate 100% of their referral program and receive 6X more referrals being hired 2X faster, without any legwork. You can take your referral hiring to the next step with an engaging and authentic referral program that produces consistent, scalable results without any extra work. It is streamlined and easy to use. You can easily pull jobs from your existing career page and update them - keep using your current workflow - we integrate and automate everything. Your team will be proud to use this intuitive and engaging tool to send quality referrals. No matter if your team is located on-site or remotely, you can always access a simple and seamless referral process in an instant.
    Starting Price: Free
  • 4
    Aruba Cloud Monitoring
    With the Cloud Monitoring service, it is possible to monitor all your websites, Cloud Servers, dedicates servers whether they are hosted in the Aruba Cloud data centers or with other providers. In cases of failures or errors detected in the monitored resource or service, Cloud Monitoring will automatically and immediately send you a notification via email or SMS, so you can always know the progress of your infrastructure in real time and if need be, take action as soon as possible. By using the charts found in the Cloud Monitoring control panel you can quickly register and analyze all the activity of the monitored services, and easily identify any problem and see how it repeats during the course of time. Through the Cloud Monitoring Control Panel, it is possible to setup checks and alerts to warn you when a service is not active. All of this makes Cloud Monitoring an essential service for managing your services.
    Starting Price: €2.99 per month
  • 5
    Systweak Advanced System Protector
    Advanced System Protector comes with a powerful engine that systematically scans and removes all infections and malicious files to keep your data secure. Advanced System Protector is loaded with features for complete protection. Clean 100% of detected threats for seamless browsing and computing experience. Just click start scan now to detect & remove infections from your PC. Ensure thorough cleaning with quick, deep & custom scan modes. Advanced System Protector not only keeps malware and infections at bay but also protects your personal information from falling into wrong hands. Detects and removes unwanted adware & toolbars to secure your data. Suspicious files are isolated from other files to prevent the further spread of infection. Deletes browser cookies and internet browsing history for privacy. Keep your system protected against malicious threats and PUPs that cause slowdowns to enhance system performance and make it more stable.
    Starting Price: $39 one-time payment
  • 6
    Staqu JARVIS
    Get real-time alerts based on centralized monitoring for safety, security, and operations on your existing camera. JARVIS is an audio-video analytics and management technology platform that has changed how people think about security cameras. It is the new technique of creating meaningful information from long CCTV video footage with short and crisp real-time alerts utilizing AI and computer vision. Fueled with artificial intelligence, patented technologies, and unique capabilities, JARVIS offers innovation for security and the best possible solution for business. JARVIS uses AI to help enterprises automate their safety, security, and operations, notably in the manufacturing, retail, and infrastructure sectors. With seamless integration, it can easily adapt to your business, and provide actionable intelligence through data-driven insights. JARVIS provides a user-friendly dashboard that will help you monitor critical incidents and take action on them.
    Starting Price: Free
  • 7
    Cubed Mobile

    Cubed Mobile

    Cubed Mobile

    End-to-end mobile security is made simple. Get the protection you need for your growing business in two simple steps. Cubed Mobile frees your employees from the need for a second device and/or second SIM while creating a secured separation between personal and business workspaces. Keep sensitive data safe and isolated in a secure environment. Ensure employees only connect to secure Wi-Fi networks. Empower your team to access the Internet securely. Protect against network, apps, privilege abuse, and advanced attacks. Strengthen security, smooth communication coordination, and ease management of BYOD with a new approach that anyone can set it up in two minutes! Create workspaces with different settings, apps, and access-rights based on user parameters. Let your admins invite and remove users, edit personal details, settings, and virtual lines, and filter lists of associated devices. Anytime you can remotely backup, restore, and wipe entire workspaces immediately.
    Starting Price: Free
  • 8
    Strategyzer

    Strategyzer

    Strategyzer

    Build an Invincible Company Stop risking your future with business as usual. Uncover your teams’ entrepreneurial potential with our globally-trusted methodology and engaging platform. Enterprise teams can train at our Cloud Academy or create a successful Corporate Innovation Ecosystem with the Growth Portfolio. Our purpose is to unlock millions of people’s potential to create value for themselves, organizations, and society. We succeed when inspired people find the clarity to drive healthy growth and build invincible companies worldwide. To make this happen, we’ve designed the global standard and platform for universal business challenges. We shift mindsets to transform strategic innovation, organization, and culture. Centralize your strategy and innovation workflow for better collaboration, increased transparency, and improved rate of success. Learn how to explore and manage new business ideas and pivot existing business models to avoid disruption.
    Starting Price: $25 per month
  • 9
    Junos Traffic Vision

    Junos Traffic Vision

    Juniper Networks

    Junos Traffic Vision is a licensed traffic sampling application for MX Series 3D Universal Edge Routers. It provides details on network traffic flows that is useful for a wide variety of operations and planning activities. Junos Traffic Vision monitors packets as they are processed by the router, and captures details such as source and destination addresses, packet and byte count information. These details are aggregated and exported in a standards-based format for analysis and presentation by Juniper and third-party-based tools that support usage-based accounting, traffic profiling, traffic engineering, attack and intrusion detection, and SLA monitoring. Implemented inline and on service cards that provide high performance and scale, Junos Traffic Vision can be deployed in both active and passive configurations and can take place alongside lawful intercept filtering and port mirroring without impacting performance.
  • 10
    cnvrg.io

    cnvrg.io

    cnvrg.io

    Scale your machine learning development from research to production with an end-to-end solution that gives your data science team all the tools they need in one place. As the leading data science platform for MLOps and model management, cnvrg.io is a pioneer in building cutting-edge machine learning development solutions so you can build high-impact machine learning models in half the time. Bridge science and engineering teams in a clear and collaborative machine learning management environment. Communicate and reproduce results with interactive workspaces, dashboards, dataset organization, experiment tracking and visualization, a model repository and more. Focus less on technical complexity and more on building high impact ML models. Cnvrg.io container-based infrastructure helps simplify engineering heavy tasks like tracking, monitoring, configuration, compute resource management, serving infrastructure, feature extraction, and model deployment.
  • 11
    SecurePlus

    SecurePlus

    Duality Technologies

    SecurePlus seamlessly integrates with existing systems so you can set up collaboration projects quickly and at scale. Our applications, including analytics and machine learning, query, and collaboration hub, enable you to run descriptive statistics; train, tune, and deploy AI and ML inference models, and deploy SQL-like queries, all while using encrypted data or models. Securely collaborate with partners in any environment to unlock the value of your data, drive revenue, and amplify efficiency across your organization. Encrypt and link disparate data sets to train and tune models or deploy analytics on aggregated data, without exposing the underlying information to third parties. Encrypt and deploy models and queries on decentralized data sets, while keeping them secure and protected from reverse engineering. Set up and manage your own secure collaboration network to enable your customers and partners to securely collaborate with one another.
  • 12
    Storidge

    Storidge

    Storidge

    Storidge was built on the idea that operating storage for enterprise applications should be really simple. We take a fundamentally different approach to Kubernetes storage and Docker volumes. By automating storage operations for orchestration systems, such as Kubernetes and Docker Swarm, it saves you time and money by eliminating the need for expensive expertise to setup, and operate storage infrastructure. This enables developers to focus their best energies on writing applications and creating value, and operators on delivering the value faster to market. Add persistent storage to your single node test cluster in seconds. Deploy storage infrastructure as code, and minimize operator decisions while maximizing operational workflow. Automated updates, provisioning, recovery, and high availability. Keep your critical databases and apps running with auto failover and automatic data recovery.
  • 13
    Revelio Labs

    Revelio Labs

    Revelio Labs

    Explore workforce dynamics like never before. Revelio Labs absorbs and standardizes hundreds of millions of public employment records to create the world's first universal HR database, allowing us to understand the workforce dynamics and trends of any company. The health and stability of companies have traditionally been understood using methods that have relied on indicators of performance. The true inner workings of a company, and its workforce, are notoriously difficult to understand and have yet to be a meaningful part of how companies have been assessed. At Revelio Labs we build the tools that are needed to understand the workforce of every company. By ingesting the universe of public workforce data, we've created a standard structure to unify occupations and job titles, skills and activities, and companies and other organizations. Our team of data scientists uses the latest methods in statistical research to remove sampling bias and anticipate lags in reporting.
  • 14
    WEKA

    WEKA

    WEKA

    WEKA 4 delivers next-level performance while running impossible workloads anywhere, without compromise. Artificial Intelligence is creating new business opportunities. Operationalizing AI requires the ability to process massive amounts of data from different sources in a short time. WEKA offers a complete solution engineered to accelerate DataOps challenges across the entire data pipeline whether running across on-prem and the public cloud. Storing and analyzing large data sets in life sciences whether it is next-generation sequencing, imaging, or microscopy requires a modern approach for faster insights and better economics. WEKA accelerates time to insights by eliminating the performance bottlenecks across the Life Sciences data pipeline, while significantly reducing the cost and complexity of managing data at scale. WEKA offers a modern storage architecture that can handle the most demanding I/O-intensive workloads and latency-sensitive applications at an exabyte scale.
  • 15
    LynxOS

    LynxOS

    Lynx Software Technologies

    LynxOS has been deployed in millions of embedded devices and has operated reliably for 30+ years across multiple safety and security-critical embedded markets. It is a tried and true approach for hosting applications on a Unix-like OS model wherein all resources and application services are centrally managed by a common kernel and is best-suited for working with hardware architectures that predate virtualization. We want our customers to buy what they need, and only what they need. Real-time operating systems can provide a tremendous amount of value, but they are not required for every embedded system design. For a more complete listing of our RTOS-related resources, visit our Embedded Systems Learning Center, which is filled with helpful material for making software purchase decisions as you design or update your system and consider which real-time platform vendor is right for you.
  • 16
    Truyo

    Truyo

    Truyo

    From consent to privacy rights automation, Truyo provides you with the tools and platform to create better privacy experiences for consumers, employees, service providers, and privacy teams. Provide a best-in-class privacy rights management solution to consumers, privacy teams, and service providers. Automate your consumers' requests for access, deletion, correction, and Do Not Sell. The Truyo solution scales to meet your needs. Whether you need something simple or full automation, Truyo has you covered. Provide transparency and build trust with your users by giving them the tools to manage consent. By simply installing some JavaScript code to your website you’ll be set up to intelligently block third-party cookies and display consent prompts to become compliant with current and emerging data privacy laws while putting the user in control. Users will have access to a customized page to manage their data preferences which can be passed across all brands.
  • 17
    VAST Data

    VAST Data

    VAST Data

    Unprecedented customer adoption establishes VAST among today's elite technology companies in just 2 short years. Leading organizations around the world use Universal Storage to eliminate storage tiering and unleash insights on vast reserves of data. Learn how you can easily and securely store all your data on exabyte-scale, affordable flash. We're simplifying data storage and redefining how organizations interact with data by breaking decades of tradeoffs. We look past the marginal gain and apply unconventional thinking in order to break decades of tradeoffs that have been imposed by legacy architectures. Our mission is to bring an end to decades of complexity and application bottlenecks. VAST combines a series of innovations to radically change the flash cost vs. capacity equation, democratizing the utility of flash for all data and all applications. The result: no more slow and failure-prone hard drives, no more complex storage tiers.
  • 18
    SentryPoint Security Suite
    Biometrics-based security, such as fingerprint authentication, is proven to be both more secure and convenient than passwords, making fingerprint sensing an increasingly common, and product-differentiating, feature in smartphones, tablets and PCs. However, fingerprint authentication also raises security concerns that can best be addressed with protections purpose-built for biometrics. Synaptics helps ensure biometric data protection through the SentryPoint Security Suite of features and architectures that accommodate the full range of market needs. This one-way conversion of biometric data into a proprietary template format prevents recreation, reverse-engineering or use for unintended purposes, thereby protecting the user from identity theft. All biometric data is encrypted and digitally signed using strong 256-bit Advanced Encryption Standard and Transport Layer Security technologies to prevent eavesdropping, tampering or fraud.
  • 19
    Ionic Machina
    Data security is managed in silos, but sensitive data traverses multiple applications, environments, data stores, and devices. This makes it challenging to scale data security and implement consistent access controls. Machina is your agile and dynamic authorization solution that easily handles modern challenges. Manage your shared responsibility to secure data at rest and in transit in the cloud and on-prem. Track how data is handled and accessed; audit how policies are enforced across your organization. Deliver context-aware dynamic authorization for each access request to maintain least privilege. Abstract access logic from app code to orchestrate policy enforcement across multiple environments. Implement and enforce consistent access policies in real-time across applications, repositories, workloads, and services. Monitor and analyze data handling and policy enforcement across your enterprise, and generate audit-ready proof of compliance.
  • 20
    Eclypsium

    Eclypsium

    Eclypsium

    Eclypsium® ensures the health and integrity of enterprise devices at the fundamental firmware and hardware layers that traditional security fails to protect. Eclypsium provides a new layer of security to defend the critical servers, networking gear, and laptops at the heart of every organization. Unlike traditional security that only protects the software layers of a device, Eclypsium brings security to the hardware and firmware. From the earliest boot process to the most fundamental code on a device, Eclypsium finds and fixes the low-level weaknesses and threats that attackers use to defeat traditional security. Get high-fidelity views into all enterprise devices including servers, networking gear, and laptops. Automatically find vulnerabilities and threats in all hardware and firmware components inside each device. See into devices both on-premises or deployed remotely including remote work and BYOD devices.
  • 21
    Netvisor ONE

    Netvisor ONE

    Pluribus Networks

    Moving to Open Networking bare metal switches brings significant operational and financial benefits to build next-generation networks. These switches provide the capacity needed to achieve cloud-scale, agility, elasticity, and adaptability. As you move to a disaggregated open networking strategy, selecting the right Network Operating System (OS) is a critical success factor. Why? The Network OS deployed unlocks the performance, functionality, and services from Open Networking switches to realize the most value. Netvisor® ONE is an open, secure, and programable next-generation Network OS that is purpose-built to optimize the power and performance of bare metal Open Networking hardware. Deployment-proven in production mission-critical enterprise and carrier networks, Netvisor ONE operating system meets the most stringent performance requirements and delivers the maximum levels of reliability and flexibility at scale, and without compromise.
  • 22
    Capgemini Intelligent Automation Platform
    At times of global economic upheaval, boardrooms are driven to rapidly re-assess strategy, priorities and focus. Some will elect to take a cautious approach while others will seize an unplanned but unique opportunity to drive positive change across their business. Today, there is an unprecedented chance to redefine enterprise; to embed new and more agile ways of working, boost innovation, and enhance customer experiences while, simultaneously, realizing new revenue opportunities, reducing costs and perhaps for the first time, do so at scale. Capgemini Intelligent Automation Platform is a purpose-built, plug and play platform enabling effective IT, applications services and business operations delivery to provide intelligent automation at its full potential for businesses to reap maximum value across the entire operation, seamlessly, and at scale. CIAP enables businesses to move from operations focused, limited value, isolated deployment of automation to an enterprise wide approach.
  • 23
    MBX Hatch

    MBX Hatch

    MBX Systems

    Hatch software revolutionizes hardware execution by transforming how hardware teams work. Purpose-built for the complexities of hardware management, Hatch blends disparate operational roles into a collaborative team, providing the tools and transparency to plan, manage, deploy, and support hardware solutions for improved execution, all within a single platform. Configurable products mean choices without challenges. Easily customize product configurations for each customer using a single BOM containing pre-defined component groupings for thousands of potential hardware permutations you can choose at the push of a button. Oversee engineering changes in a traceable repository. Every description, due date, status, review, and approval is consolidated in one spot. Say goodbye to archaic spreadsheets, errant emails, and extraneous applications. Tracking work in process in real-time down to the work center allows you to accurately update customers for orders in process.
  • 24
    VIOLIN Maestro OS
    Demanding enterprises worldwide depend on storage that can deliver results. The storage operating system for the next generation is here now with Maestro OS. Valuable enterprise data needs protection with enterprise data services. Meanwhile, the business requires any new storage to be cost-effective. Complex enterprise workloads demand performance that is more than a point solution. VIOLIN's Maestro OS delivers all of this and more. Synchronous replication, WAN-optimized replication, and consistency groups for replication. Snapshots (crash consistent), consistency groups for snapshots, transparent LUN mirroring, and backup app integration. Scale-up to 737.28 TB raw, online expansion of capacity, and online LUN expansion. Start now by connecting with our experts to assess your storage needs. See how the QV-Series works with a quick setup of an online test environment. Partner with the right team to start driving down your total cost of ownership.
  • Previous
  • You're on page 1
  • Next