97 Integrations with NXLog

View a list of NXLog integrations and software that integrates with NXLog below. Compare the best NXLog integrations as well as features, ratings, user reviews, and pricing of software that integrates with NXLog. Here are the current NXLog integrations in 2024:

  • 1
    Perl

    Perl

    Perl

    Perl is a highly capable, feature-rich programming language with over 30 years of development. Perl is a highly capable, feature-rich programming language with over 30 years of development. Perl runs on over 100 platforms from portables to mainframes and is suitable for both rapid prototyping and large scale development projects. "Perl" is a family of languages, "Raku" (formerly known as "Perl 6") is part of the family, but it is a separate language which has its own development team. Its existence has no significant impact on the continuing development of "Perl". Perl includes powerful tools for processing text that make it ideal for working with HTML, XML, and all other mark-up and natural languages. Perl can handle encrypted Web data, including e-commerce transactions.
    Starting Price: Free
  • 2
    XML

    XML

    World Wide Web Consortium (W3C)

    Extensible Markup Language (XML) is a simple, very flexible text format derived from SGML (ISO 8879). Originally designed to meet the challenges of large-scale electronic publishing, XML is also playing an increasingly important role in the exchange of a wide variety of data on the Web and elsewhere. This page describes the work being done at W3C within the XML Activity, and how it is structured. Work at W3C takes place in Working Groups. The Working Groups within the XML Activity are listed below, together with links to their individual web pages. You can find and download formal technical specifications here, because we publish them. This is not a place to find tutorials, products, courses, books or other XML-related information. There are some links below that may help you find such resources. You will find links to W3C Recommendations, Proposed Recommendations, Working Drafts, conformance test suites and other documents on the pages for each Working Group.
    Starting Price: Free
  • 3
    Rapid7 InsightIDR
    With the cloud architecture and intuitive interface in InsightIDR, it's easy to centralize and analyze your data across logs, network, endpoints, and more to find results in hours—not months. User and Attacker Behavior Analytics, along with insights from our threat intel network, is automatically applied against all of your data, helping you detect and respond to attacks early. In 2017, 80% of hacking-related breaches used either stolen passwords and/or weak or guessable passwords. Users are both your greatest asset and your greatest risk. InsightIDR uses machine learning to baseline your users' behavior, automatically alerting you on the use of stolen credentials or anomalous lateral movement.
  • 4
    Cisco Network Assistant
    Cisco Network Assistant simplifies wired and wireless network management for networks up to 80 devices with its intuitive GUI and a task-based menu. Cisco Network Assistant is free and is optimized to apply common services across Cisco switches, routers, wireless controllers, and access points. Through a direct link to Cisco Active Advisor you can view important information pertaining to the products on your network, such as Warranty and Contract Information, Advisories and End of Life notifications. Cisco Active Advisor will be automatically populated with the devices managed through Cisco Network Assistant. Network administrators get a centralized view of the network with Cisco Network Assistant. They also have the flexibility to employ its features across Cisco products for small to midsize businesses or branch offices. Network discovery and convenient display in a topology map. Configuration management of Cisco products fitting small and medium businesses.
  • 5
    VMware vCenter
    Gain centralized visibility, simplified and efficient management at scale, and extensibility across the hybrid cloud—all from a single console. VMware vCenter Server is advanced server management software that provides a centralized platform for controlling your VMware vSphere environments, allowing you to automate and deliver a virtual infrastructure across the hybrid cloud with confidence. Quickly deploy vCenter as a pre-packaged, optimized, and easy-to-maintain virtual appliance. Integration of vSphere Update Manager into vCenter Server Appliance makes patching and upgrading fast and easy. RESTful APIs allow for the easily repeatable deployment of vCenter Server Appliance from a template, speeding up deployment times as well as reducing human error. Seamlessly extend your on-premises environment to vSphere-based public clouds, such as VMware Cloud on AWS, no matter which version of vCenter you are running.
  • 6
    Microsoft IIS

    Microsoft IIS

    Microsoft

    Internet Information Services (IIS) for Windows® Server is a flexible, secure and manageable Web server for hosting anything on the Web. From media streaming to web applications, IIS's scalable and open architecture is ready to handle the most demanding tasks.
  • 7
    ZeroMQ

    ZeroMQ

    ZeroMQ

    ZeroMQ (also known as ØMQ, 0MQ, or zmq) looks like an embeddable networking library but acts like a concurrency framework. It gives you sockets that carry atomic messages across various transports like in-process, inter-process, TCP, and multicast. You can connect sockets N-to-N with patterns like fan-out, pub-sub, task distribution, and request-reply. It's fast enough to be the fabric for clustered products. Its asynchronous I/O model gives you scalable multicore applications, built as asynchronous message-processing tasks. It has a score of language APIs and runs on most operating systems.
    Starting Price: Free
  • 8
    SilverSky Managed Security Services
    With the acceleration of cyber threats across new security vectors, the effort, skill, and technology needed to defend against these dangers continues to dramatically increase and become more complex. Security teams can quickly become overwhelmed. For over 20 years, SilverSky has evolved as a managed security service provider to serve the security and regulatory needs of our small and mid-sized clients with simple and cost-effective solutions. We specialize in serving highly regulated sectors. Monitoring the perimeter with firewalls is no longer good enough. Companies need to monitor all points of contact within their estate. This means networks, servers, databases, people and endpoints. The most efficient way to achieve this is with a professionally staffed Security Operations Center or SOC as a service. SilverSky Security Monitoring will monitor perimeter and core security devices to provide sufficient protection to exceed regulatory compliance.
  • 9
    ERP-AIX

    ERP-AIX

    AIX Sistemas

    AIX Sistemas. With over 29 years of experience in developing technology solutions for teaching management, AIX Sistemas' mission is to contribute to improving the performance of Brazilian education, helping educators to extract the greatest value from technology. We offer functional and complete solutions, which help the institution to operate efficiently and safely, so that all areas can work in collaboration, with a focus on generating value for the student. For all these reasons, we are more than a software company: we are partners with educators . Only company in the segment with technical support for 13 uninterrupted hours per day, from Monday to Friday. The service is online and allows the technician to access the customer's machine via chat to solve problems. ll AIX Customers with an active maintenance contract can take the ERP-AIX System online courses free of charge, ensuring permanent and free training for the institution.
  • 10
    Logstash

    Logstash

    Elasticsearch

    Centralize, transform & stash your data. Logstash is a free and open server-side data processing pipeline that ingests data from a multitude of sources, transforms it, and then sends it to your favorite "stash." Logstash dynamically ingests, transforms, and ships your data regardless of format or complexity. Derive structure from unstructured data with grok, decipher geo coordinates from IP addresses, anonymize or exclude sensitive fields, and ease overall processing. Data is often scattered or siloed across many systems in many formats. Logstash supports a variety of inputs that pull in events from a multitude of common sources, all at the same time. Easily ingest from your logs, metrics, web applications, data stores, and various AWS services, all in continuous, streaming fashion. Download: https://sourceforge.net/projects/logstash.mirror/
  • 11
    SISA ProACT

    SISA ProACT

    SISA Information Security

    It’s time to rewire your security operations. SISA’s Managed detection and response solution is scalable and adaptable to the everchanging threat landscape and delivers 10x value by accelerating time to investigation and optimizing total operational costs. The platform offers a unified experience through integrated portals: GUI interface, Client site appliance, and Agent for resource monitoring. The indigenous algorithm, a “conscious” one, continuously reviews security events to decrease the dwell time from ticket to resolution. From breach investigations to damage assessments and remediation, take advantage of timely and actionable information through digital forensics. Out-of-the-box brand intel solution to initiate takedowns on unauthorized apps and content from in-depth, laser focused research on worldwide and dark web. With custom response solutions including host isolation or traffic blocking, directly respond to endpoints and close incidents with agility and speed.
  • 12
    AT&T Cybersecurity

    AT&T Cybersecurity

    AT&T Cybersecurity

    As one of the world’s largest Managed Security Services Providers (MSSP), AT&T Cybersecurity delivers the ability to help safeguard digital assets, act with confidence to detect cyber threats to mitigate business impact, and drive efficiency into cybersecurity operations. Defend your endpoints from sophisticated and ever-present cyber threats, detect and respond autonomously at machine speed, and proactively hunt threats down before they start to act. Instant threat prevention, detection, and response to help protect your devices, users, and business. Automatically terminate malicious processes, disconnect and quarantine infected devices, and rollback events to keep endpoints in a constant clean state. Logic and analysis performed on the endpoint agent, not in the cloud, helping protect endpoints in real time, even when offline. Automatically group alerts into patented storylines that provide analysts with instant actionable context and fewer headaches.
  • 13
    Red Hat Enterprise Linux
    Red Hat Enterprise Linux is an enterprise Linux operating system, certified on hundreds of clouds and with thousands of vendors. Red Hat Enterprise Linux provides a consistent foundation across environments and the tools needed to deliver services and workloads faster for any application. Red Hat Enterprise Linux reduces deployment friction and costs while speeding time to value for critical workloads, enabling development and operations teams to innovate together in any environment. Red Hat Enterprise Linux extends your hybrid cloud infrastructure to the edge—across hundreds of thousands of nodes all over the world. Create edge-optimized OS images, minimize workload interruptions caused by OS updates, transfer system updates more efficiently, and have confidence in automatic health checks and rollbacks. Run purpose-built command line utilities to automate many inventory and remediation steps associated with upgrading your subscription or migrating from another Linux distro.
    Starting Price: $99 one-time payment
  • 14
    SUSE CaaS Platform
    SUSE CaaS Platform is an enterprise-class container management solution that enables IT and DevOps professionals to more easily deploy, manage, and scale container-based applications and services. It includes Kubernetes to automate lifecycle management of modern applications, and surrounding technologies that enrich Kubernetes and make the platform itself easy to operate. As a result, enterprises that use SUSE CaaS Platform can reduce application delivery cycle times and improve business agility.
  • 15
    Zeek

    Zeek

    The Zeek Project

    Zeek (formerly Bro) is the world’s leading platform for network security monitoring. Flexible, open source, and powered by defenders. Zeek has a long history in the open source and digital security worlds. Vern Paxson began developing the project in the 1990s under the name “Bro” as a means to understand what was happening on his university and national laboratory networks. Vern and the project’s leadership team renamed Bro to Zeek in late 2018 to celebrate its expansion and continued development. Zeek is not an active security device, like a firewall or intrusion prevention system. Rather, Zeek sits on a “sensor,” a hardware, software, virtual, or cloud platform that quietly and unobtrusively observes network traffic. Zeek interprets what it sees and creates compact, high-fidelity transaction logs, file content, and fully customized output, suitable for manual review on disk or in a more analyst-friendly tool like a security and information event management (SIEM) system.
    Starting Price: Free
  • 16
    Trellix XDR
    Introducing the Trellix Platform, a composable XDR ecosystem that adapts to the challenges of your business. The Trellix Platform learns and adapts for living protection while delivering native and open connections and providing expert and embedded support for your team. Keep your organization resilient with adaptive prevention that adjusts and responds in machine time to threats. Customers trust 75M endpoints to Trellix. Maximize business agility through zero trust principles and protect against front-door, side-door, and back-door attacks, all while streamlining policy management. Get comprehensive, non-invasive protection for your cloud-native applications, through secure agile DevOps and visible deployment environments. Our email and collaboration tool security protects against high-volume exposure points and attackers, automating for optimized productivity and enabling secure and agile teamwork.
  • 17
    SAP Cloud Platform
    Extend your business processes in the cloud. Extend SAP solutions in a fast and agile way without disrupting key business processes - leveraging existing investments and expertise. Rapidly develop robust and scalable cloud-native applications. Leverage your existing ABAP expertise to create new extensions or renovate existing custom apps. Innovate for business agility with cloud-native, low-code, and responsive event-driven applications. Accelerate outcomes with intelligent business process optimization. Discover, configure, extend and optimize business processes, connecting experience data to operational workflows. Gain impactful and actionable insights to anticipate business outcomes and uncover new revenue and growth opportunities. Harness the power of predictive analytics and machine learning capabilities. Embed real-time intelligence into your business applications. Advance and personalize the user experience for your customers, partners and employees.
  • 18
    F5 BIG-IP
    Advanced technology for an app-centric world. Apps are your business. BIG-IP application services provide the availability, performance, and security you need to meet business demands. Keep your apps up and running with BIG-IP application delivery controllers. BIG-IP Local Traffic Manager (LTM) and BIG-IP DNS handle your application traffic and secure your infrastructure. You’ll get built-in security, traffic management, and performance application services, whether your applications live in a private data center or in the cloud. BIG-IP Diameter Traffic Management, BIG-IP Policy Enforcement Manager (PEM), and BIG-IP Carrier-Grade NAT (CGNAT) manage network resources to keep your applications performing at carrier-grade levels. They also help you identify ways to optimize and monetize your network, improving your bottom line.
  • 19
    Oracle Database
    Oracle database products offer customers cost-optimized and high-performance versions of Oracle Database, the world's leading converged, multi-model database management system, as well as in-memory, NoSQL, and MySQL databases. Oracle Autonomous Database, available on-premises via Oracle Cloud@Customer or in the Oracle Cloud Infrastructure, enables customers to simplify relational database environments and reduce management workloads. Oracle Autonomous Database eliminates the complexity of operating and securing Oracle Database while giving customers the highest levels of performance, scalability, and availability. Oracle Database can be deployed on-premises when customers have data residency and network latency concerns. Customers with applications that are dependent on specific Oracle database versions have complete control over the versions they run and when those versions change.
  • 20
    IBM Security QRadar SIEM
    Market-leading SIEM built to outpace the adversary with speed, scale and accuracy As digital threats loom large and cyber adversaries grow increasingly sophisticated, the roles of SOC analysts are more critical than ever. Going beyond threat detection and response, QRadar SIEM enables security teams face today’s threats proactively with advanced AI, powerful threat intelligence, and access to cutting-edge content to maximize analyst potential. Whether you need cloud-native architecture built for hybrid scale and speed or a solution to complement your on-premises infrastructure, IBM can provide you with a SIEM to meet your needs. Experience the power of IBM enterprise-grade AI designed to amplify the efficiency and expertise of every security team. With QRadar SIEM, analysts can reduce repetitive manual tasks like case creation and risk prioritization to focus on critical investigation and remediation efforts.
  • 21
    Atos OneCloud
    On the journey to the cloud, no path is the same. While some are dealing with the realities of legacy infrastructure, others are already well on their way with a hybrid or multi-cloud environment. The steps to progress on your cloud journey look different for every company. Atos OneCloud helps enterprises shape a cloud forward future. Atos OneCloud is a ground-breaking initiative that blends cloud advisory consulting, application transformation expertise, prebuilt cloud accelerators, and innovative talents in an end-to-end set of services to help our clients navigate their cloud journey securely. Atos OneCloud modernizes enterprise applications to be agile, mobile, and rooted in analytics, across public, private, and hybrid cloud environments.
  • 22
    CIMPLICITY

    CIMPLICITY

    GE Digital

    Optimize operator efficiency with high performance HMI while reducing risk with proven visualization and SCADA. Precisely monitor and control operations with high performance CIMPLICITY HMI/SCADA. As a proven automation platform, CIMPLICITY provides true client-server visualization and control—from single machines to plant locations spanning the world—helping you manage your operations and improve decision making. Based on decades of GE's research and development, CIMPLICITY is the HMI and SCADA of choice for the world's largest organizations. For applications of all sizes, CIMPLICITY can help deliver faster response, reduce costs, and increase profitability. Our latest version enables high performance HMI to speed operator actions, offers secure-by-design connectivity and certification management, and enhances modeling for repeatability and time savings.
  • 23
    PostgreSQL

    PostgreSQL

    PostgreSQL Global Development Group

    PostgreSQL is a powerful, open-source object-relational database system with over 30 years of active development that has earned it a strong reputation for reliability, feature robustness, and performance. There is a wealth of information to be found describing how to install and use PostgreSQL through the official documentation. The open-source community provides many helpful places to become familiar with PostgreSQL, discover how it works, and find career opportunities. Learm more on how to engage with the community. The PostgreSQL Global Development Group has released an update to all supported versions of PostgreSQL, including 15.1, 14.6, 13.9, 12.13, 11.18, and 10.23. This release fixes 25 bugs reported over the last several months. This is the final release of PostgreSQL 10. PostgreSQL 10 will no longer receive security and bug fixes. If you are running PostgreSQL 10 in a production environment, we suggest that you make plans to upgrade.
  • 24
    Hadoop

    Hadoop

    Apache Software Foundation

    The Apache Hadoop software library is a framework that allows for the distributed processing of large data sets across clusters of computers using simple programming models. It is designed to scale up from single servers to thousands of machines, each offering local computation and storage. Rather than rely on hardware to deliver high-availability, the library itself is designed to detect and handle failures at the application layer, so delivering a highly-available service on top of a cluster of computers, each of which may be prone to failures. A wide variety of companies and organizations use Hadoop for both research and production. Users are encouraged to add themselves to the Hadoop PoweredBy wiki page. Apache Hadoop 3.3.4 incorporates a number of significant enhancements over the previous major release line (hadoop-3.2).
  • 25
    Devo

    Devo

    Devo Technology

    WHY DEVO Devo Data Analytics Platform. Achieve full visibility with centralized cloud-scale log management. Say goodbye to constraints and compromises. Say hello to the new generation of log management and analytics that powers operations teams. For machine data to improve visibility, transform the SOC, and achieve enterprise-wide business initiatives, you need to keep pace with the relentless real-time demands of exploding data volumes, while not breaking the bank. Massive scale, no ninjas required. Forget about re-architecting. Devo grows with your business, exceeding even the highest demands without requiring you to manage clusters and indexes or be confined by unreasonable limits. Onboard giant new datasets in a snap. Roll out access to hundreds of new users painlessly. Always meet your teams’ demands year after year, petabyte upon petabyte. Agile cloud-native SaaS. Lift-and-shift cloud architectures just don’t cut it. They’re afflicted with the same performance
  • 26
    Securonix Security Operations and Analytics
    The Securonix Security Operations and Analytics Platform combines log management; user and entity behavior analytics (UEBA); next-generation security information and event management (SIEM); network detection and response (NDR); and security orchestration, automation and response (SOAR) into a complete, end-to-end security operations platform. The Securonix platform delivers unlimited scale, powered by advanced analytics, behavior detection, threat modeling, and machine learning. It increases your security through improved visibility, actionability, and security posture, while reducing management and analyst burden. With native support for thousands of third-party vendors and technology solutions, the Securonix platform simplifies security operations, events, escalations, and remediations. It easily scales from startups to global enterprises while providing the same fast security ROI and ongoing transparent and predictable cost.
  • 27
    TEHTRIS XDR Platform
    The XDR infrastructure brings together several security solutions within a single coherent platform, capable of detecting and responding to security incidents. TEHTRIS XDR Platform meets multiple key needs. It uses its network of efficient sensors, such as TEHTRIS EDR components, to improve protection, detection and response capabilities against an attack on the network where it is positioned. With the TEHTRIS XDR Platform, you’ll be ready to face the unpredictable. TEHTRIS XDR Platform is centrally configurable, with an intuitive system to build its own decision trees on what to do in the event of an attack. Having a centralized, holistic view in the unified console of the TEHTRIS XDR Platform allows cyber security analysts to mix and match different views without ever being blindsided.
  • 28
    Chronicle SOC
    We live in a digital world, but the current economics of storing and processing enterprise security data have made it not just expensive, but nearly impossible to compete against cybercrime. But what if the scalability and economics of storing and analyzing your organization's security data were no longer an issue? Chronicle was built on the world’s biggest data platform to bring unmatched capabilities and resources to give good the advantage. Sourced by Chronicle’s security research team, Google Cloud threat signals are embedded right in the Chronicle platform. Uppercase signals are based on a mix of proprietary data sources, public intelligence feeds, and other information. Even the best analysts struggle to process the sheer volume of security telemetry that a modern enterprise generates. Chronicle can handle petabytes of data, automatically. Automatic analysis helps your analysts understand suspicious activity in seconds, not hours.
  • 29
    CentOS

    CentOS

    CentOS

    CentOS Linux is a community-supported distribution derived from sources freely provided to the public on Red Hat or CentOS git for Red Hat Enterprise Linux (RHEL). As such, CentOS Linux aims to be functionally compatible with RHEL. The CentOS Project mainly changes packages to remove upstream vendor branding and artwork. CentOS Linux is no-cost and free to redistribute. Each CentOS version is maintained until the equivalent RHEL version goes out of general support. A new CentOS version is made available once a new RHEL version is rebuilt - approximately every 6-12 months for minor point releases and several years for major version bumps. The length of time the rebuild takes varies from weeks for point releases to months for major version bumps. This results in a secure, low-maintenance, reliable, predictable and reproducible Linux environment.
  • 30
    Oracle Solaris
    We’ve been designing the OS for for more than two decades, always ensuring that we’ve engineered in features to meet the latest market trends while maintaining backward compatibility. Our Application Binary Guarantee gives you the ability to run your newest and legacy applications on modern infrastructure. Integrated lifecycle management technologies allow you to issue a single command to update your entire cloud installation—clear down to the firmware and including all virtualized environments. One large financial services company saw a 16x efficiency gain by managing its virtual machines (VMs) using Oracle Solaris, compared to a third-party open-source platform. New additions to the Oracle Solaris Observability tools allow you to troubleshoot system and application problems in real time, giving you real-time and historical insight and allowing for unprecedented power to diagnose and resolve issues quickly and easily.
  • 31
    Apache Tomcat
    The Apache Tomcat® software is an open source implementation of the Jakarta Servlet, Jakarta Server Pages, Jakarta Expression Language, Jakarta WebSocket, Jakarta Annotations and Jakarta Authentication specifications. These specifications are part of the Jakarta EE platform. Apache Tomcat software powers numerous large-scale, mission-critical web applications across a diverse range of industries and organizations. Some of these users and their stories are listed on the PoweredBy wiki page. The Apache Tomcat Project is proud to announce the release of version 10.0.10 of Apache Tomcat. This release implements specifications that are part of the Jakarta EE 9 platform.
  • 32
    Azure Table Storage
    Use Azure Table storage to store petabytes of semi-structured data and keep costs down. Unlike many data stores—on-premises or cloud-based—Table storage lets you scale up without having to manually shard your dataset. Availability also isn’t a concern: using geo-redundant storage, stored data is replicated three times within a region—and an additional three times in another region, hundreds of miles away. Table storage is excellent for flexible datasets—web app user data, address books, device information, and other metadata—and lets you build cloud applications without locking down the data model to particular schemas. Because different rows in the same table can have a different structure—for example, order information in one row, and customer information in another—you can evolve your application and table schema without taking it offline. Table storage embraces a strong consistency model.
  • 33
    Apache NiFi

    Apache NiFi

    Apache Software Foundation

    An easy to use, powerful, and reliable system to process and distribute data. Apache NiFi supports powerful and scalable directed graphs of data routing, transformation, and system mediation logic. Some of the high-level capabilities and objectives of Apache NiFi include web-based user interface, offering a seamless experience between design, control, feedback, and monitoring. Highly configurable, loss tolerant, low latency, high throughput, and dynamic prioritization. Flow can be modified at runtime, back pressure, data provenance, track dataflow from beginning to end, designed for extension. Build your own processors and more. Enables rapid development and effective testing. Secure, SSL, SSH, HTTPS, encrypted content, and much more. Multi-tenant authorization and internal authorization/policy management. NiFi is comprised of a number of web applications (web UI, web API, documentation, custom UI's, etc). So, you'll need to set up your mapping to the root path.
  • 34
    CGI Advantage ERP
    As governments strive to do more with less and deliver vital services, there's no better time to transform your business. CGI provides the expertise and insight to drive innovation without disruption and create value for all of your stakeholders. Success isn't just about where you are going and how you will get there; it's about the partnerships you develop along the way. We're here to be relied upon as an insightful and resourceful partner as you implement your ERP solution. CGI Advantage is purpose-built to support your robust public sector needs with relevant out-of-the-box functionality that ramps up quickly and a seamless, unified experience across core ERP components. Our approach helps you balance investments in legacy systems replacement with solutions that digitally transform government operations at a manageable, affordable pace and minimize risk. You'll play an integral role in the evolution of your ERP solution by sharing best practices that support collaboration.
  • 35
    Ubiquiti UID
    Customize site and user access with a secure, Cloud-based, IDaaS solution. Optimize network security through a combination of single sign-on (SSO), multi-factor authentication (MFA), and lifecycle management (LCM) services. Manage user access in an elegant, easy-to-use interface. Connect to your corporate WiFi or VPN with one click. Connect and authenticate your access instantly. Securely manage your access control system. Allow employees to unlock doors with their phone, NFC card, or a variety of other easy authentication methods. Greet guests from your mobile device when they call through a UA Pro reader. An intricately layered suite of authentication methods that adapts to user behavior, application sensitivity, and other situational risks.
  • 36
    Synology Drive
    Rest assured you always have secure online access to all your personal and shared data, whether from the Synology Drive mobile app, desktop client, web browser, or another Synology NAS. Safely share your documents and secure them with granular permission settings and SSL encryption. Work across computers in continuity using the desktop app. It's still your native Windows, macOS, or Ubuntu interface, but any changes you make to a file are automatically synced to other devices as soon as they're connected. Stream files to your device only when they are requested1 to save local disk space and bandwidth, or pin them to your computer to permanently keep a local copy. Protect your data from ransomware attacks or accidental deletion with the real-time or scheduled backup of important folders.
  • 37
    Vijilan

    Vijilan

    Vijilan Security

    Guaranteeing an organization’s safety includes detecting any malicious and unusual activity, which takes time, expertise, and the right technology. The retention of log data for a certain time is required for regulated industries such as finance or healthcare. In addition, the stored data can be used for further investigations. We are the last line of defense when hackers have already passed through the organization’s security appliances and tools. To offer an end-to-end solution to businesses of any size at an affordable price. A continuous monitoring system requires robust technology and advanced processes to collect logs from on-premises or cloud sources. Such a solution must translate them into standard events before submitting them to a storage destination for the necessary lifecycle. Technology is a medium, not an end. MSP-oriented solution accessible to small and medium size organizations.
  • 38
    CENTUM CS

    CENTUM CS

    Yokogawa

    With the actual implementations in many plants and absolutely high reliability, CENTUM CS has been the best seller of large-scale DCS since its first sale in 1993. Since it was released in 1993, CENTUM CS is widely applied in the plants of oil refinery, petrochemical, chemistry, iron and steel, non-ferrous metal, metal, cement, paper pulp, food and pharmaceutical industries, and power, gas and water supply as well as many other public utilities. The excellent operability and engineering technique, and the high reliability proved by the abundant actual application results, guaranteed that the CENTUM CS will continue to play an important role in the 21st century.
  • 39
    AVEVA Connect
    Drive innovation, growth, and sustainability by adopting a trusted cloud platform designed to meet the unique needs of the industrial sector. With 10,000+ monthly active users, companies worldwide depend on our industrial cloud platform to connect their data and communities. Empower your ecosystem with trusted information and sector-specific insights, from site to cloud, allowing you to execute your most impactful work with confidence. Tailor your digital strategy and easily scale as-needed with a flexible subscription model that puts you in full control. Leverage our preconfigured AI enhancements to gain industrial insights in real-time. Discover new ways of working that optimize productivity, engagement, and carbon efficiencies through our as-a-service offerings. Accelerate time to value with industrial SaaS solutions that are easy to deploy, access, and manage securely across any global enterprise.
  • 40
    CyGlass

    CyGlass

    CyGlass

    CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people. The CyGlass Cloud continuously analyzes the billions of conversations happening on your network, learns what is normal, and alerts when suspicious behaviors that risk the security of your critical IT assets are detected. CyGlass complies with data privacy laws as the CyGlass Cloud doesn’t require any personally identifiable information (PII) to detect threats. CyGlass eXtended Cloud Security delivers a cost-effective cloud and network detection, response, and compliance solution for small IT security teams. When combined with an endpoint defense tool, the solution will meet 100% of the detection, remediation, and compliance needs of medium and small organizations at a fraction of the cost.
  • 41
    CyberCAST
    CyberCAST is our comprehensive cybersecurity software that enhances our managed security services. Our platform illuminates critical insights into an organization’s threat susceptibility and informs a dynamic cybersecurity strategy that matures over time. Starting with a combination of technical penetration testing and a detailed security audit, this results in a quantitative security risk score that provides a foundation for developing a comprehensive cybersecurity strategy. Our security professionals examine all findings to tailor our approach to the organization’s specific needs. The penetration test component evaluates findings based on business risk and categorizes vulnerabilities based on systemic and process-related issues. Best of all, you don’t have to be a technical genius to understand it. CyberCAST delivers all security findings in plain business language that’s easy to understand and communicate to executive leadership and your board.
  • 42
    Raijin

    Raijin

    RAIJINDB

    In order to deal with sparse data, the Raijin Database uses a flat JSON representation for the data records. The Raijin Database supports SQL as its primary query language while lifting some of SQL's limitations. Data compression not only saves disk space but provides a performance boost with modern CPUs. Most NoSQL solutions are inefficient at or totally lack support for analytical queries. Raijin DB supports group by and aggregations using standard SQL syntax. Vectorized execution and cache-friendly algorithms allow large amounts of data to be operated on. Backed by optimized SIMD instructions (SSE2/AVX2) and a modern compressed hybrid columnar storage layer it ensures that your CPUs are not wasting cycles. This gives unparalleled data-crunching capabilities an order of magnitude faster compared to other solutions written in higher level or even interpreted languages which are inefficient at processing large amounts of data.
  • 43
    Azure DNS

    Azure DNS

    Microsoft

    Use Azure DNS to host your Domain Name System (DNS) domains in Azure. Manage your DNS records using the same credentials, and billing and support contract, as your other Azure services. Seamlessly integrate Azure-based services with corresponding DNS updates and streamline your end-to-end deployment process. Azure DNS Private Resolver (in preview) is a cloud-native, highly available, and DevOps-friendly service. It provides a simple, zero-maintenance, reliable, and secure DNS service to resolve and conditionally forward DNS queries from a virtual network to on-premises DNS servers and other target DNS servers without the need to create and manage a custom DNS solution. Resolve DNS names hosted in Azure DNS private zones from on-premises networks as well as DNS queries for your own domain names. This will make your DNS infrastructure work privately and seamlessly across on-premises networks and enable key hybrid networking scenarios.
  • 44
    IBM AIX
    For over three decades, our customers have trusted AIX to run their most mission critical applications. As we enter a new era, AIX will continue to drive innovation with hybrid cloud and open source capabilities helping customers build and deploy modern applications in a secure and resilient environment. Enterprises need infrastructure that is secure, highly available and adaptable to meet changing business demands. AIX®️ on Power Systems delivers these capabilities and more, with the performance, reliability and security your mission-critical data requires. Simplify and accelerate cloud deployment of your AIX apps with an architecture consistent with your on-prem environment Achieve zero downtime during planning maintenance and modernize AIX with the latest enhancements. AIX UNIX operating system maintains a strong, long-standing security focus and reputation.
  • 45
    Cognizant

    Cognizant

    Cognizant

    Reimagine your Revenue Cycle. Powered by intelligent automation, proven methods, and experienced professionals, our RCM solutions are purpose-built to help you improve performance. Through partnership with Cognizant, you can improve your financial results quickly and advance every aspect of your business office with digital. With a strong business office and trusted partner, you can focus on delivering amazing care. Are rising costs, increasing patient responsibilities and changing regulations creating new challenges for your organization? Cognizant creates customized end-to-end solutions to fit your needs to help achieve optimal operations and financial success. Utilizing innovative solutions and services combined with industry expertise, we help clients transform their business to drive growth and prepare for the future of healthcare. Learn how we help hospitals, health systems and physician practices drive intelligent automation to simplify business processes.
  • 46
    OpenText ArcSight Enterprise Security Manager
    Experience powerful, efficient threat detection and response through security analytics from a next-gen SIEM. Real-time threat detection and response backed by a powerful, open, and intelligent SIEM (Security Information and Event Management). Gain enterprise-wide threat visibility from an industry-leading data collection framework that connects to all your security event devices. When it comes to threat detection, every second counts. ESM’s powerful real-time correlation offers the fastest way to detect known threats. Coordinating a rapid response to threats is critical for Next-Gen SecOps. Automated responses and workflow processing keep your SOC efficient. A Next-Gen SIEM will efficiently integrate with your existing security solutions to boost their ROI and support a layered analytics approach. ArcSight ESM leverages the Security Open Data Platform, whose SmartConnectors can connect to 450+ data source types to collect, aggregate, clean, and enrich your data.
  • 47
    SIMATIC SCADA
    Digitalization is noticeably changing our world – and the world of industry. The data volume in modern industrial plants is growing continuously. That brings new challenges for SCADA solutions: Enormous data volumes must be managed and archived for the long term. At the same time, production processes must be monitored and controlled as reliable, efficient, and productive as possible and they must be constantly optimized. With it’s scalable, open system landscape for the vertical integration of data from the production to the MES/ERP level up to cloud solutions, SIMATIC SCADA offers a solution that is ready for the challenges of today and tomorrow. Digitalization creates new opportunities for making industrial processes more versatile, more individual and more efficient. Key components for this are integrated concepts for production – from data acquisition and analysis to strategic decision-making.