48 Integrations with Intel Unite
View a list of Intel Unite integrations and software that integrates with Intel Unite below. Compare the best Intel Unite integrations as well as features, ratings, user reviews, and pricing of software that integrates with Intel Unite. Here are the current Intel Unite integrations in 2024:
-
1
Hour One
Hour One
Hour One provides an AI video generator featuring engaging, photo-realistic virtual presenters. Hour One is the ideal solution for any organization that needs to create effective product video content, easily, quickly, and affordably at scale. ⚡️ All you need to do (after quickly signing up) is pick your character and theme setting, type in your text for the AI character to voice out, and your video will be generated in a matter of minutes. You can connect Hour One into your favorite workflows and simplify your video creation and publishing process by integrating it with PowerPoint, Slack, OneDrive and more. 🤖Starting Price: $25 per month -
2
phoenixNAP
phoenixNAP
phoenixNAP is a global IaaS provider delivering world-class infrastructure solutions from strategic edge locations in the U.S., Europe, Asia-Pacific, Australia, and Latin America. Specializing in performance, security, and availability, the company provides vastly redundant systems, unsurpassed security, high-density deployments, and flexibility to service from ¼ cabinets to private cage environments. Its Bare Metal Cloud solution provides access to 3rd Gen Intel® Xeon® Scalable Processors for advanced infrastructure performance and reliability. phoenixNAP offers a 100% uptime guarantee, an extensive server lineup, global connectivity options, flexible SLAs, and 24x7x365 live support to help businesses achieve their business objectives. Deploy high-performance, scalable cloud solutions for your growing IT needs, along with the security and reliability that you require at opex-friendly pricing plans.Starting Price: $0.10/hour -
3
Atlantic.Net
Atlantic.Net
From meeting the strictest security, privacy, and compliance requirements to ensuring a robust and scalable hosting environment, our hosting solutions are designed to help bring focus to your core business and applications. Our Compliance Hosting solutions are a perfect fit for financial services and healthcare organizations, that require the most robust security levels for their data. Certified and audited by third-party independent auditors, Atlantic.Net compliance hosting solutions fulfill HIPAA, HITECH, PCI, or SOC requirements. From your first consultation to ongoing operations, you’ll benefit from our proactive, result-oriented approach to your digital transformation. Gain a clear, significant advantage with our managed services to make your organization more efficient and productive. Address your industry’s regulatory mandates by building in a HIPAA, HITECH, PCI-DSS, and GDPR compliant environment.Starting Price: $233 per month -
4
GTHost
GTHost
GTHost ensure complete transparency with all pricing. Your final cost is itemized and complete before your first payment is due. Access your account billing through our easy customer dashboard to see each charge, make changes and get pricing questions answered quickly. Our systems employ leading brand dedicated servers with state-of-the-art components including Samsung, Seagate and Micron storage and Intel CPU. With better components we can guarantee better service across all dedicated servers. We know your time is important and downtime for your company, employees and customers can be a major drain on your resources. This is why GTHost is committed to providing continuous, 100% network uptime guarantee. With optimal equipment and a knowledgeable team, we make sure you’re never stuck waiting on our dedicated servers. GTHost is committed to bringing clients across the USA, Canada and Europe better, more reliable dedicated servers rental.Starting Price: $59 per month -
5
Connect data with business context and empower business users to unlock insights with our unified data and analytics cloud solution. SAP Data Warehouse Cloud unifies data and analytics in a cloud solution that includes data integration, database, data warehouse, and analytics capabilities to help you unleash the data-driven enterprise. Built on the SAP HANA Cloud database, this software-as-a-service (SaaS) empowers you to better understand your business data and make confident decisions based on real-time information. Connect data across multi-cloud and on-premises repositories in real-time while preserving the business context. Get insights on real-time data and analyze data with in-memory speed, powered by SAP HANA Cloud. Empower all users with self-service ability to connect, model, visualize and share their data securely, all in an IT governed environment. Leverage pre-built industry and LOB content, templates and data models.
-
6
Bluescape
Bluescape
Bluescape is the platform for creative collaboration. Streamline workflows with all your ideas, assets, iterations, and entire projects into one secure virtual workspace. With built-in voice and video calling, simply gather your team in Bluescape and make quicker decisions. Reduce meetings and finish projects faster in a secure platform trusted by Fortune 100 companies, government agencies, and the world’s largest movie studios.Starting Price: Free -
7
Cloudamize
Cloudamize
Simplify your cloud migration and get to the cloud faster with more accuracy. Cloudamize reduces the complexity of cloud migration and transformation. We’re proud of helping 1,000+ enterprises annually navigate the journey to the cloud and are confident in our ability to help expedite your own cloud initiatives. The Cloudamize platform has 3 different methods to collect data, and now has full network discovery capabilities, helping to ensure that you've captured data all of your critical applications. With a Cloud TCO Assessment you'll be able to review baseline plans and create a custom business case for an accelerated cloud migration strategy. The Migration Planner component will enable quick grouping of applications & servers by Wave, 7R, and/or custom business application. The Migration Assistant component will allow you to connect to your CSP account, select a Migration Planner group, and begin the replication of applications right within the Cloudamize platform.Starting Price: $11/Server -
8
Turn data chaos into data value with data intelligence. Connect, discover, enrich, and orchestrate disjointed data assets into actionable business insights at enterprise scale. SAP Data Intelligence is a comprehensive data management solution. As the data orchestration layer of SAP’s Business Technology Platform, it transforms distributed data sprawls into vital data insights, delivering innovation at scale. Provide your users with intelligent, relevant, and contextual insights with integration across the IT landscape. Integrate and orchestrate massive data volumes and streams at scale. Streamline, operationalize, and govern innovation driven by machine learning. Optimize governance and minimize compliance risk with comprehensive metadata management rules. Connect, discover, enrich, and orchestrate disjointed data assets into actionable business insights at enterprise scale.Starting Price: $1.22 per month
-
9
iWeb
iWeb
Since 1996, iWeb’s scalable hosting solutions have helped organizations around the world turn big ideas into powerful brands and applications. Now part of Leaseweb, today we share both the innovative spirit of our smallest customers and the global footprint of our most established. Instantly deploy dedicated servers across Leaseweb’s global network of data centers, with online sales and assistance. Host your servers on a highly resilient network that delivers uninterrupted availability month after month. Partnering with iWeb means qualified system administrators and a friendly help team available for you. We work with our partners at Intel and Microsoft to bring you their latest technologies before anyone else. We embrace the innovative power of open source programming, with Linux hosting and OpenStack cloud servers. And we offer the latest, most energy-efficient server hardware.Starting Price: $0.06 per hour -
10
Accenture Cloud Trade Promotion Management
Salesforce AppExchange
Increased global competition makes it more difficult for companies to succeed in today’s marketplace. These organizations are now looking to drive more meaningful interactions with customers, channels, shoppers, and consumers to positively impact sales numbers. Historically, consumer products companies have had an overabundance of solutions across their front office. Accenture and Salesforce seek to address this business challenge by establishing a single system of engagement for sales processes on a single platform that integrates Salesforce capabilities with Accenture’s extensive experience within the consumer goods space. Plan and develop winning promotional campaigns with an overview of trade investments, spending, and profitability with Accenture Cloud Trade Promotion Management. Empower your management and field sales teams to help deliver more targeted and compliant promotions with Accenture Cloud Retail Execution.Starting Price: $120 per month -
11
Check Point Infinity
Check Point
Organizations frequently implement multiple cyber security solutions in pursuit of better protections. As a result, they are frequently left with a patchwork security architecture that results in a high TCO. By adopting a consolidated security approach with Check Point Infinity architecture, businesses realize preemptive protection against advanced fifth-generation attacks, while achieving a 50% increase in operational efficiency and 20% reduction in security costs. The first consolidated security architecture across networks, cloud, mobile and IoT, providing the highest level of threat prevention against both known and unknown cyber-threats. 64 different threat prevention engines blocking against known and unknown threats, powered by threat intelligence. Infinity-Vision is the unified management platform for Check Point Infinity, the first modern, consolidated cyber security architecture built to prevent today’s most sophisticated attacks across networks, cloud, endpoints, etc. -
12
Check Point IPS
Check Point IPS
Intrusion Prevention Systems detect or prevent attempts to exploit weaknesses in vulnerable systems or applications, protecting you in the race to exploit the latest breaking threat. Check Point IPS protections in our Next Generation Firewall are updated automatically. Whether the vulnerability was released years ago, or a few minutes ago, your organization is protected. Check Point IPS delivers thousands of signature and behavioral preemptive protections. Our acceleration technologies let you safely enable IPS. A low false positive rate saves your staff valuable time. Enable IPS on any Check Point security gateway reducing total cost of ownership. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely. -
13
ICONICS IoT
ICONICS
Make your HMI/SCADA platform more accessible and efficient with the power of IoT. The Internet of Things (IoT) sees the world in a smart, interconnected way. Its vision is to connect assets, or “things”, to a larger IoT software system, or network of systems that make up a smart grid. These “things” retain the capability of actuation, control, automation and autonomous operation. The unification of devices results in vast amounts of data being collected, which empowers users with more opportunities than ever. ICONICS’ SCADA with IoT collects this data and provides the operator with a new layer of actionable intelligence. ICONICS IoT connects your buildings, facilities, and equipment through secure TLS encryption and Microsoft Azure. Your data in the cloud can be accessed from anywhere through pub/sub architecture for real-time visualization of KPI data at the edge. We deliver an efficient, secure connection to the cloud through bi-directional AMQP for Microsoft Azure. -
14
Cisco Kinetic
Cisco
Get business value from your IoT data and meet challenges in IoT environments where devices and applications are highly distributed. Count on the Cisco Kinetic to help securely connect your devices. Add compute power anywhere in the network, from edge to cloud. And selectively move data to applications to drive better business outcomes. Cisco Kinetic includes two modules that work together to help you securely connect devices, and then extract, compute and move your IoT data. Compute data in distributed nodes. Make critical decisions near the point of action, and make the most efficient use of network resources. Move the right data from diverse connected devices to the right cloud-based applications, at the right time, according to policy set by the data owner. Improve business outcomes with our end-to-end IoT portfolio. Securely connect assets, applications, and data in real-time to apply transformative business changes in both carpeted and non-carpeted spaces. -
15
Maximize the value of all your organization’s structured and unstructured data with exceptional functionalities for data integration, quality, and cleansing. SAP Data Services software improves the quality of data across the enterprise. As part of the information management layer of SAP’s Business Technology Platform, it delivers trusted,relevant, and timely information to drive better business outcomes. Transform your data into a trusted, ever-ready resource for business insight and use it to streamline processes and maximize efficiency. Gain contextual insight and unlock the true value of your data by creating a complete view of your information with access to data of any size and from any source. Improve decision-making and operational efficiency by standardizing and matching data to reduce duplicates, identify relationships, and correct quality issues proactively. Unify critical data on premise, in the cloud, or within Big Data by using intuitive tools.
-
16
Asavie
Asavie
Asavie’s on-demand mobility and IoT services provide increased productivity, valuable insights and enhanced security for the digital business. Understand how our products can help your enterprise harness the power of mobile communications and the IoT. Asavie SD Mobile is a network-based, enterprise mobility service that provides a highly secure internet experience for mobile devices. Because of its vantage position in the network, it ensures visibility, security and control across the mobile fleet. Asavie SD Edge provides the agility to extend the enterprise private network to mobile assets. CIOs can deliver a seamless and secure connectivity experience to employees with corporate mobile assets, for an in the office experience from anywhere. Asavie SD IoT is a self-serve private mobile IoT network. The private network protects IoT devices by eliminating the exposure to cyberattacks on the public internet, keeping IoT deployments safe from Day One. -
17
Heficed
Heficed
Heficed empowers you to scale your business worldwide effortlessly with IP addresses, virtual servers and bare-metal using one platform. Cloud Servers empower you to utilize the compute and IP resources right when you need them. Designed for the most demanding businesses that require high performance, stability and data security. Lease, manage and monetize IP addresses without any hassle. The IPv4 lease marketplace helps monetize unused IP resources and alleviate the IPv4 shortage problem. Reach clients around the globe at top-tier, ISO-certified data centers. Heficed offers unique locations in Johannesburg and Sao Paulo, as well as several locations in North America and Europe. Leverage more than a decade of Heficed’s experience with IPs, infrastructure and network services. Built for the VPN, cybersecurity, hosting and business intelligence industries. Find and acquire the data you need quickly and efficiently. Utilize extensive IP resources using our powerful infrastructure.Starting Price: $5 per month -
18
Enveil
Enveil
Data is the backbone of the digital economy, we change the paradigm of how and where organizations can leverage data to unlock value. Enterprises use Enveil’s award-winning ZeroReveal® solutions to securely and privately use data in-place across organizational boundaries, jurisdictions, and third parties while ensuring that the content of the interaction and the results are never exposed. Our PETs and homomorphic encryption-powered capabilities deliver an efficient and decentralized data collaboration framework designed to reduce risk and address business challenges including data sharing, monetization, and regulatory compliance. Protecting data while it's being used or processed, the ‘holy grail’ of secure data usage, we deliver the most mature encrypted search, analytic, and machine learning products on the market. Enveil is a pioneering privacy enhancing technology company protecting data in use for secure data usage, sharing, and monetization. -
19
Aruba Jelastic Cloud
Aruba Cloud
Jelastic Cloud is a Cloud service that offers maximum scalability of virtualized resources thanks to the combination of the PaaS (Platform as a Service) and CaaS (Container as a Service) models. Container technology is based on the use of micro clouds called cloudlets, with 128MB of RAM and 400MHz of vCPU, which can be used directly within the Jelastic platform. The service is available on a pay-per-use basis and preconfigured plans with monthly fees. Jelastic Cloud lets you create, change and clone your chosen environment in seconds. The infrastructure takes shape in real-time thanks to the virtualization of resources (storage, servers, load balancers, databases etc.) and the many technologies available (Docker, Ruby, PHP, Java, etc.) Jelastic Cloud allows different pricing models, as well as various flat-rate options, a pay-per-use option is also available, which means you can take advantage of platform scalability while only paying for the resources you actually use.Starting Price: €0.0040 per hour -
20
Candera CGI Studio
Candera
Candera CGI Studio enables the creation of brilliant human-machine interfaces and UIs of all kinds for the automotive area and beyond. Candera CGI Studio is a scalable and hardware-independent HMI design software. It enables the creation of brilliant and customizable embedded UI solutions of all kinds for the automotive area and beyond. The special USP of this GUI creation tool is its user-friendly interface and the high-performance representation of 2D/3D display elements and animations. CGI Studio comes with ready-to-use HMI controls, an AI-based smart Photoshop importer, and integrated state machines enabling to display the logics with only a few clicks. The open architecture of CGI Studio allows deep integration and automatization into your company’s workflow. CGI Studio allows you to develop unique 2D/3D automotive clusters directly to your hardware of choice and into the market, as fast as possible. -
21
Fiddler
Fiddler
Fiddler is a pioneer in Model Performance Management for responsible AI. The Fiddler platform’s unified environment provides a common language, centralized controls, and actionable insights to operationalize ML/AI with trust. Model monitoring, explainable AI, analytics, and fairness capabilities address the unique challenges of building in-house stable and secure MLOps systems at scale. Unlike observability solutions, Fiddler integrates deep XAI and analytics to help you grow into advanced capabilities over time and build a framework for responsible AI practices. Fortune 500 organizations use Fiddler across training and production models to accelerate AI time-to-value and scale, build trusted AI solutions, and increase revenue. -
22
HyTrust
HyTrust
In a multi-cloud world where technology moves at lightning speed and security often plays catchup, organizations face the daunting challenge of eliminating the gaps and resolving the inconsistencies in policy enforcement and adherence to compliance mandates. HyTrust CloudControl provides advanced privileged user access control, policy enforcement, forensic and automated compliance for private clouds. HyTrust DataControl provides powerful data-at-rest encryption and integrated key management for workloads running in any cloud environment. Encrypting workloads helps enterprises to ensure their data is protected. One of the challenges of workload encryption is scaling the management of encryption keys. HyTrust’s mission is to make private, public and hybrid cloud infrastructure more trustworthy for enterprises, service providers and government agencies. HyTrust provides solutions that automate security controls for software-defined computing, networking and storage workloads. -
23
C3 AI CRM
C3 AI
A general-purpose system-of-record CRM is no longer sufficient to address the dynamics of today’s market and the mandates of digital transformation. Introducing a new generation of industry-specific AI CRM that delivers powerful predictive insights to boost performance of sales, marketing, and service, tailored for every industry. Predictive AI-driven insights delivered at every step of industry-specific workflows boost performance of your sales, marketing, and service professionals. Focus on high-value leads recommended by industry-specific AI models with the right sales play and pricing. Identify customers with high churn risk, and retain them with AI-recommended strategies. Generic CRM and Customer Experience Management solutions can take a long time to implement and even longer to yield economic benefits. C3 AI CRM provides industry-specific applications that are pre-built with industry object models, AI models, workflows, and data connectors to meet your unique business needs. -
24
Intercede
Intercede
MyID® credential management software enables governments and large enterprises to issue and manage digital identities using the most secure method of multi-factor authentication to citizens, large workforces and supply-chains. Today, MyID enables the strong authentication of millions of people to the data, systems and networks they need access to. For those responsible for information security, MyID provides easy integration and control over digital identity issuance and management. For end users, whether citizens or employees, MyID enables seamless, secure access to company systems, networks and resources using multi-factor authentication via a variety of devices. Faced with ever increasing threats of cyber terrorism, identity fraud and crime, MyID® provides a cyber secure credential management software solution. Where data really matters, you will find MyID. The security, reliability and interoperability of MyID software sets it apart. -
25
Rocket EOS 360
Rocket
Simply providing access to reports and data on the mainframe is no longer enough for today’s stakeholders. Your users, whether they’re employees, partners, or customers, increasingly expect a more modern digital experience and efficient workflows. And with more regulation and restrictions across the world impacting data security, you’re expected to protect all data, regardless of platform. Rocket® EOS 360 integrates with mainframe environments to capture output from applications, manage the storage of that data and provide fast and secure access for users. Rocket EOS 360 allows you to allocate precious MSUs to business-critical applications, improving the efficiency of your output management system. Rocket EOS 360 centralizes your data and provides a single, secure point of access to ensure you stay in compliance with any regulations and minimize the risk of a data security leak. -
26
C3 AI Sensor Health
C3 AI
C3 AI® Sensor Health ensures the operational effectiveness of IoT devices and network infrastructure during both the deployment and the operational life cycle of IoT devices. Visualize sensor status, deployment progress, and geographic regions of concern, and access a prioritized view of sensors with identified health issues. Identify sensor deployment issues, diagnose the source of sensor malfunctions, optimize field service, and forecast future deployment progress.Ensure device installation information is correct, consistent, and current across source and cloud data systems. Monitor and analyze physical integrity, functionality, and communication of sensor devices to optimize field service and issue resolution. Visualize planned sensor deployment, actual deployment and provisioning progress, device operational issues and trends, and service work priorities. Present analyses and summarize results using preformatted and custom reports, including failure analysis, health analysis, etc. -
27
Cisco Prime Network
Cisco
Cisco Prime Network is a cost-effective device operation, administration, and network fault-management solution. This single solution helps service providers reduce management complexity and deliver carrier-class services. It supports the physical network components as well as the compute infrastructure, and virtual elements found in data centers. Increased operational efficiency through automated network discovery, configuration and change management. Enhanced customer satisfaction through proactive service assurance using postevent fault management and trend information. Lower integration costs through preintegration with Cisco Prime Carrier Management suite and northbound interfaces to third party applications. Detailed end-to-end views of the physical and virtual network topology and inventory. GUI-based device configuration with prebuilt and downloadable scripts. Up-to-date displays of network event, state, and configuration changes. -
28
At times of global economic upheaval, boardrooms are driven to rapidly re-assess strategy, priorities and focus. Some will elect to take a cautious approach while others will seize an unplanned but unique opportunity to drive positive change across their business. Today, there is an unprecedented chance to redefine enterprise; to embed new and more agile ways of working, boost innovation, and enhance customer experiences while, simultaneously, realizing new revenue opportunities, reducing costs and perhaps for the first time, do so at scale. Capgemini Intelligent Automation Platform is a purpose-built, plug and play platform enabling effective IT, applications services and business operations delivery to provide intelligent automation at its full potential for businesses to reap maximum value across the entire operation, seamlessly, and at scale. CIAP enables businesses to move from operations focused, limited value, isolated deployment of automation to an enterprise wide approach.
-
29
Volico
Volico
Volico provides top-tier data center colocation services that ensure your data is secure while giving you the ability to access and scale faster your critical IT infrastructure on-demand. Let Volico take the pressure off your IT staff by managing your data and infrastructure environment with our around-the-clock Managed Services offering. Enterprise-class cloud solutions ensure applications are always available and secure. Public, Private, Hybrid, and Managed Clouds Powered By KVM. Comprehensive IT security solutions to ensure your infrastructure guarded against intentional, hostile intrusions. Our Security Services include Managed Firewall, DDoS Mitigation, Disaster Recovery, Business Continuity, and more. Fully managed dedicated servers offer you the ultimate in scalability, security, uptime, and performance. Servers hardware is built from the highest quality components and our support technicians are certified experts. -
30
Codero
Codero
Reliable, high-performance infrastructure dedicated to your specific business and operational needs. We’ll devise your optimal solution. Our engineers will design a future-proof implementation to support your business growth and long-term success. Our experts will make migration seamless, with a thorough strategy, clear communication, and minimal disruption to your business services. Network optimization solutions designed for maximum efficiency, reliability and functionality. Protect you infrastructure and data with cutting-edge protection against cyber threats and Internet bad boys. Backup and disaster recover solutions to protect you from data loss and keep your business up and running. Get better performance, privacy, and control with Codero Private Cloud. Refer or resell. Codero helps you extend your brand. Our experienced team will get to know your company, operational needs, goals, and the type of workloads you’ll be running. -
31
Peak
Peak
A new decision intelligence system, putting AI in the hands of commercial leaders to drive great decision making. CODI, our Connected Decision Intelligence system, has been engineered by Peak to become a layer of intelligence that sits between your other systems, unleashing the power of your data for the first time. CODI enables you to quickly deploy AI solutions, harnessing the true potential of your data thanks to its unique full-stack features. It allows data science and data engineering teams to take full control of every aspect of building and deploying AI solutions, at speed and at scale. With CODI, AI projects move beyond being just experiments and become fully-deployed solutions that deliver real world value and results. Built on enterprise-grade infrastructure, CODI is capable of handling data at scale, and seamlessly integrates into existing tech stacks. Surface more insight and combine data from across your organization. -
32
Agent3
Agent3
Today’s marketers live on the hot seat, facing constant pressure to prove results amidst a climate of continual change and sky-high expectations, CMOs need big wins; sales teams demand more support and better leads; customers expect specialized treatment. Meanwhile, organizational structures shift, and budgets get stretched further and further. We arm sales teams with insights about target stakeholders, messaging that’s differentiated from the competition, and content that engages customers. We help sales win, retain, and expand accounts. We help marketers run ABM programs at scale, with creative that breaks the mold, activations that can run as 1:1, 1:few or 1:many, and optimization that gets results. We help Marketing build, scale, and optimize ABM programs. Every two weeks we send out our latest insights and research, developed by our ABM specialists. We create powerful, creative, end-to-end account based marketing programs with measurable impact. -
33
HackGuard
AppVision
AppVision provides critical technology that protects apps against hacking and malicious threats. In addition, AppVision also provides app publishers with unprecedented visibility into their worldwide installed base. See at a glance all of the most important health parameters of your installed base. Conveniently arranged graphical widgets enable you to instantly get a handle on the current status, emerging trends and specific areas of concern. Just drag, drop, enlarge or rearrange the placement of the widgets to easily create your own favorite layout. Search, filter and sort your alert log datagrid to quickly see exactly when the attack started, and to see if it is still continuing. With a single click, see the initial attack’s source IP and pinpoint its geo-location on a map. Then view the alerts by country map to see where a persistent attack is coming from. If you are using HackGuard Enterprise, you can even determine exactly who within your installed base is at risk. -
34
Kaspersky Blockchain Security
Kaspersky Blockchain Security
Blockchain-based technology is becoming increasingly popular and is now used to solve a wide range of tasks. And it's not all about cryptocurrencies. Its many applications make blockchain technology a key element in establishing business processes that can even be applied in manufacturing. Blockchain technology is present in IoT networks, workflow management systems, cryptocurrencies and many other fields. It is now an essential component and state-of-the-art standard for a whole host of businesses. However, being a security-driven measure, a blockchain itself can be exposed to various risks. Given the fact that blockchains contain sensitive information about the assets and infrastructure of specific users and enterprises, providing comprehensive protection is critically important. Instant reaction to intrusions, identity compromise and security breaches. Neutralize cyberattacks without waiting for them to violate and crash your network. -
35
Chainer
Chainer
A powerful, flexible, and intuitive framework for neural networks. Chainer supports CUDA computation. It only requires a few lines of code to leverage a GPU. It also runs on multiple GPUs with little effort. Chainer supports various network architectures including feed-forward nets, convnets, recurrent nets and recursive nets. It also supports per-batch architectures. Forward computation can include any control flow statements of Python without lacking the ability of backpropagation. It makes code intuitive and easy to debug. Comes with ChainerRLA, a library that implements various state-of-the-art deep reinforcement algorithms. Also, with ChainerCVA, a collection of tools to train and run neural networks for computer vision tasks. Chainer supports CUDA computation. It only requires a few lines of code to leverage a GPU. It also runs on multiple GPUs with little effort. -
36
Your customer's mission-critical video surveillance and security applications require a reliable platform that performs at peak performance 24/7/365. To meet these requirements StarWind offers purpose-built platforms that leverage fault-tolerant architecture from storage and up to application management. StarWind HCA platforms combine server, storage, networking, and hypervisor as well as a single proactive support umbrella for all components. You tell us your requirements and we tailor you the perfect solution preserving Milestone, Genetec, and Briefcam best practices, and put it through all the required testing to give you fastest possible time-to-solution and peace of mind knowing your reputation and the solution you deliver to your customers are both rock-solid. We covered all the needs and pain points specific to Integrators and MSPs in the security space: unbeatable performance, fault tolerance, convenient management, and minimized hardware footprint.
-
37
Eugenie
Eugenie
Eugenie’s powerful decision framework enables industrial organizations to get the maximum value out of their assets and processes. At Eugenie, we have made AI an invisible, yet a robust force to ensure industrial operational efficiency and reliability. We have built Eugenie as an inclusive system of technology, efficiency, and trust. Eugenie’s unique framework of Explainable AI empowers decision-makers with data-driven conclusions. Armed with root-cause analysis and predictive insights, Eugenie’s digital ecosystem enables informed decision-making. The corporative ecosystem of Eugenie comprises of congruence between human and machine capabilities. Eugenie’s AI-first approach encompasses user-centric designs to improve machine and process reliability. We consider technology as an ally to augment human efficiency. Eugenie’s highly agile digital infrastructure makes it an ideal solution for quick industrial insight generation. -
38
Graymatics
Graymatics
Graymatics provides a cognitive multimedia analytics platform capable of transforming images and videos into meaningful granular data. We primarily offer CCTV based video analytics solutions to enable our clients draw critical insights from existing infrastructure all in detailed dashboards. Graymatics is a leading cognitive media processing company founded in Silicon Valley in 2011. Currently headquartered in Singapore, we are a revolutionary cloud platform that enables automatic analysis and recognition of products within surveillance, telecom, media, advertising, retail and eCommerce. Being one of the few companies in its’ field to offer such in-depth analysis, we offer a unique set of products to clients who might have been used to more traditional technology. Industry expert in video analytics across industries i.e. schools, workplaces and law enforcement. Highly optimized models with minimal hardware requirements in terms of RAM & GPU. -
39
TouchSource
TouchSource
Our comprehensive suite of intelligent digital signs and simple software is designed for easy deployment and use at properties everywhere. Supercharge your space with intelligent digital signage. If you want to add value to your property with contactless or interactive content experiences, then look no further. Our captivating digital displays and IoT-connected directory solutions create compelling experiences guaranteed to engage your tenants, visitors, and shoppers every time. Engage the right people with the right content management features. Our captivating digital displays and IoT-connected directory solutions improve the customer experience and let our clients shine. The digital signage solutions we offer are simple to deploy, easy to use, and require minimal effort to maintain. TouchSource is an industry visionary grounded in the success of our customers and focused on continual innovation backed by a network of outstanding partners. -
40
MobiledgeX
MobiledgeX
Run your application with the power of production-grade edge infrastructure already helping applications across XR, gaming, robotics, and other fields to offer the immersive and pervasive experiences they need to be competitive leaders. MobiledgeX Inc. is building a marketplace of edge computing resources and services that will connect developers with the world’s largest mobile networks to power the next generation of applications and devices. We develop edge cloud software to help operators run telco edge cloud on their own infrastructure, and provide device native SDK and matching engines that developers use to bring their cloud-native applications to edge and take advantage of the telco edge cloud. MobiledgeX works with some of the world’s leading technology companies to help give mobile network operators (MNOs) more choice and control over how they utilize their own telco network edge infrastructure. -
41
Affirmed Cloud Edge
Affirmed
The Affirmed Cloud Edge (ACE) solution for mobile edge computing (MEC) offers Communication Service Providers (CSPs) and Enterprises the ability to host applications and keep data local on the customers’ premises to minimize latency and maximize efficiency. Affirmed’s MEC solution can be deployed and utilized at the edge of the mobile operator’s network or used as part of the Cloud Edge offerings from AWS, Microsoft Azure, or Google Cloud. Mobile edge computing allows telecom operators to create high-value use cases for businesses and consumers. Fast air interface and rapid session establishment for new low latency services such as immersive in-stadium experiences. Optimize content for the delivery method and user conditions in time and space. Efficient bandwidth and compute use for optimized IoT analytic applications and content caching. Fast air interface and rapid session establishment. Use for localized high bandwidth applications such as AR/VR entertainment. -
42
Casa Systems
Casa Systems
5G technology enables network customization like never before, providing a unique opportunity to build and control the network experience end to end. Private networks, locally hosted or via the cloud, offer a path to data ownership, high levels of security, application customization, and differentiated performance using a variety of radio technologies. As 5G expands, all signs point to a new era of private and hybrid public/private networks. The move is already underway among a growing number of organizations eager to improve security, availability, and reliability. Process sensitive data on-site or securely in the cloud. Prioritize levels of security by application or location. Process data locally, and immediately, to reduce lag and minimize latency for near-real-time functions like computer vision and quality control. Flexibly set quality of service (QoS), compliance, and user experience parameters across the network. -
43
Open Container Initiative (OCI)
Open Container Initiative (OCI)
The Open Container Initiative is an open governance structure for the express purpose of creating open industry standards around container formats and runtimes. Established in June 2015 by Docker and other leaders in the container industry, the OCI currently contains two specifications, the runtime specification (runtime-spec) and the image specification (image-spec). The runtime specification outlines how to run a “filesystem bundle” that is unpacked on disk. At a high-level an OCI implementation would download an OCI Image then unpack that image into an OCI Runtime filesystem bundle. At this point the OCI Runtime Bundle would be run by an OCI Runtime. The Open Container Initiative (OCI) is a lightweight, open governance structure (project), formed under the auspices of the Linux Foundation, for the express purpose of creating open industry standards around container formats and runtime. The OCI was launched on June 22nd 2015 by Docker, CoreOS and other leaders. -
44
viisights
viisights
viisights' behavioral recognition video-understanding technology transforms video streams into valuable & intelligent real-time actionable insights that increase urban security, safety, and resource optimization, thus creating safer and smarter cities with a higher quality of life. Infuse viisights' intelligent video analysis technology with other IoT sensors for reduced loss prevention, enhanced resource optimization, better work safety, and tighter workflow & environment control, with minimal false alerts. Recognize and predict security threats & safety hazards in transportation hubs, infrastructures, and sensitive locations by adding viisights' powerful ai video surveillance software to every video stream. viisights' highlights important events of interest within vast amounts of video content in real-time and from diverse sources and points of view. viisights’ in-cabin monitoring platform keeps vehicle occupants safe, secure, and vehicle protected when using shared mobility. -
45
Nutanix Self-Service
Nutanix
NCM Self-Service (formerly Calm) streamlines how teams manage, deploy and scale applications across hybrid clouds with self-service, automation, and centralized role-based governance. One-click self-service with centralized role-based IT governance across private and public clouds. End-to-end automation of application provisioning, scaling, and management. Deploy applications with centralized visibility across private and public clouds. Blueprints can be published directly to end-users through the Nutanix Marketplace and be created in a UI or via Python code enabling self-service provisioning of complex applications. Provision, configure, scale, upgrade and delete applications across cloud environments. Begin with automation of common lifecycle activities and eventually design complex blueprints. Automate the provisioning of hybrid cloud architectures and manage multi-tiered and distributed applications across different cloud environments, from a single control plane. -
46
Nutanix Security Central
Nutanix
NCM Security Central unifies cloud security operations for your workloads and data on any cloud type while automating incident response with intelligent analysis and regulatory compliance. Build an automated, multi-cloud response dashboard and platform for critical initiatives like defense-in-depth and Zero Trust (ZTA). Quickly assess your risk of a security incident by understanding the vulnerabilities in your apps and data before you’re compromised. Instantly comply with industry standards using custom audits across clouds from public to on-premises without a heavy management lift. Correlate potential security vulnerabilities using Qualys’ scanning integration, then leverage the power of Nutanix X-Play to automate incident response or create micro-segmentation workflows. Gain asset visibility across workloads anywhere, then audit these findings against standards like CIS, NIST CSF v1.1, PCI-DSS v3.2.1, HIPAA for public clouds, or PCI-DSS v3.2.1 and DISA STIG for Nutanix on-prem. -
47
VPS Mart
VPS Mart
Most suitable for hosting websites, hosting own personal servers, testing new applications, and adding additional file storage. Best choice for hosting heavy load web APPs, heavy-traffic websites, multiple websites and APPs. Most suitable for hosting fast-growing business or websites with unpredictable traffic. With over ten years of Windows and Linux VPS hosting experience, our team will efficiently and effectively take good care of your needs. Professional and experienced, our support experts will provide technical services with high quality via live chats/emails. Most issues can be handled within one hour or less. Certified as SSAE 16 SOC-1 Type II compliant, our data centers in Dallas and Denver have been through an in-depth audit of the control objectives and activities. We offer free DNS services, free SolidCP for Windows hosting servers, and free ISPConfig for Linux hosting servers, with a goal to give you the best experience.Starting Price: $4.99 per month -
48
ColoCrossing
ColoCrossing
Colocation is choosing to house servers and devices at a professional data center with network redundancy, security, backup power sources, and a 24/7 staff. Dedicated Servers allow businesses and organizations to leverage a datacenter’s existing infrastructure to maximize reliability and minimize costs. Hiring a Managed Services Provider (MSP) provides peace of mind mentality, allowing businesses to focus on their core business while not having to worry about their IT infrastructure. Each and every ColoCrossing hosting management package includes 24/7 priority technical service support. Our team of experienced, trained technicians will be a part of your initial deployment, ensuring our familiarity with your hosting environment. So when time is of the essence, no time is wasted in figuring out how your setup works. At ColoCrossing, we offer colocation services that are both reliable and affordable.Starting Price: $59 per month
- Previous
- You're on page 1
- Next