6 Integrations with Oracle Advanced Security
View a list of Oracle Advanced Security integrations and software that integrates with Oracle Advanced Security below. Compare the best Oracle Advanced Security integrations as well as features, ratings, user reviews, and pricing of software that integrates with Oracle Advanced Security. Here are the current Oracle Advanced Security integrations in 2025:
-
1
TSM
The Service Manager
TSM Evolution is our Cloud-based operations and field service management solution fully hosted within the Australian based Amazon Web Service (AWS) Environment. This includes current best in class security and backup protocols. TSM Evolution is a comprehensive yet fully configurable business management solution, providing the required flexibility to properly manage your field service operational workflow requirements. Access your data anywhere, anytime to manage your business effectively.Starting Price: $45 per user/month -
2
Oracle Data Guard
Oracle
Oracle Data Guard ensures high availability, data protection, and disaster recovery for enterprise data. Oracle Data Guard provides a comprehensive set of services that create, maintain, manage, and monitor one or more standby databases to enable production Oracle databases to survive disasters and data corruptions. Data Guard provides the management, monitoring, and automation software to create and maintain one or more synchronized copies of a production database to protect Oracle data from failures, disasters, human error, and data corruptions while providing high availability for mission critical applications. Data Guard is included with Oracle Database Enterprise Edition. Active Data Guard is licensed option to the Oracle Database Enterprise Edition and enables advanced capabilities that extend the basic Data Guard functionality.Starting Price: $46 per user per year -
3
Sandfly Security
Sandfly Security
Trusted on critical infrastructure globally, Sandfly delivers agentless Linux security with no endpoint agents and no drama. Instant deployment without compromising stability or needing endpoint agents. Sandfly is an agentless, instantly deployable, and safe Linux security monitoring platform. Sandfly protects virtually any Linux system, from modern cloud deployments to decade-old devices, regardless of distribution or CPU architecture. Besides traditional Endpoint Detection and Response (EDR) capabilities, Sandfly also tracks SSH credentials, audits for weak passwords, detects unauthorized changes with drift detection, and allows custom modules to find new and emerging threats. We do all of this with the utmost safety, performance, and compatibility on Linux. And, we do it without loading agents on your endpoints. The widest coverage for Linux on the market. Sandfly protects most distributions and architectures such as AMD, Intel, Arm, MIPS, and POWER CPUs. -
4
Oracle Exadata
Oracle
Oracle Exadata is the best place to run Oracle Database, simplifying digital transformations, increasing database performance, and reducing costs. Customers achieve higher availability, greater performance, and up to 40% lower cost with Oracle Exadata, as described in Wikibon’s analysis. Oracle Cloud Infrastructure, Oracle Cloud@Customer, and on-premises deployment options enable customers to modernize database infrastructure, move enterprise applications to the cloud, and rapidly implement digital transformations. Oracle Exadata allows customers to run Oracle Database with the same high performance, scale, and availability wherever needed. Workloads easily move between on-premises data centers, Cloud@Customer deployments, and Oracle Cloud Infrastructure, enabling customers to modernize operations and reduce costs. -
5
Cisco Multicloud Defense
Cisco
Simplify security and gain multidirectional protection across any public or private cloud to block inbound attacks, lateral movement, and data exfiltration using a single solution. Manage security across public and private clouds from one place. Create, enforce, and update policies across all your clouds in real-time. Ingress, egress, and east-west protection stop inbound threats, block command and control, and data exfiltration, and prevent lateral movement. Proactively close security gaps within your cloud environment using real-time asset discovery. Automate underlying cloud network constructs and integrate with infrastructure as code for greater agility, flexibility, and scale. Cisco Multicloud Defense secures your cloud data and workloads from all angles. Organizations are adopting multi-cloud environments for greater agility, flexibility, and scale. -
6
Kkonnect.io
Kkonnect.io
At Kkonnect.io, every feature is designed to drive real results—reducing time, costs, and inefficiencies, while enhancing transparency and decision-making. Explore the key features that make this platform essential for hardware manufacturers. Automate demand gathering, create and distribute RFQs seamlessly, and track supplier responses in real-time. Eliminate spreadsheet-heavy workflows. Our AI analyzes quotes side-by-side, highlighting key differences and cost implications for faster, more informed decisions. Share RFQs via a single link with multiple suppliers at once--no need to manage countless emails.
- Previous
- You're on page 1
- Next