10 Integrations with SQLXPress
View a list of SQLXPress integrations and software that integrates with SQLXPress below. Compare the best SQLXPress integrations as well as features, ratings, user reviews, and pricing of software that integrates with SQLXPress. Here are the current SQLXPress integrations in 2025:
-
1
IBM Cloud
IBM
IBM Cloud® capabilities enable business agility and resiliency. Explore the platform that gives you 2.5x value. Designed for industry, security and the freedom to build and run anywhere. Business workflow transformation with automation and AI. Strong technology partner ecosystem that delivers value for industry needs. Industry and business domain expertise and solutions. Automated and auditable processes. Unique capabilities for the highest levels of cloud security and monitoring. Consistent security and controls posture across all applications. Containerized capabilities for DevOps, automation, data and security. Ease of integration and a consistent application development lifecycle. Advanced technologies including IBM Watson®, analytics, IoT, and edge. -
2
ServiceNow
ServiceNow
Digitize your workflows - they'll love you for it. Your company can be more productive and your people more engaged. ServiceNow makes work, work better for people. Transform old, manual ways of working into modern digital workflows, so employees and customers get what they need, when they need it—fast, simple, easy. ServiceNow delivers digital workflows that create great experiences and unlock productivity for employees and the enterprise. We simplify the complexity of work on a single, enterprise cloud platform. The Now Platform: The intelligent and intuitive cloud platform for work. Choose from our workflows or build your own apps. Built on the Now Platform, our product portfolio delivers the IT, Employee, and Customer Workflows that matter with enterprise solutions to help drive every part of your digital transformation. Create the great experiences you want and unlock the productivity you need, now with native mobile capabilities for everyday work across the enterprise.Starting Price: $100 per month -
3
SailPoint
SailPoint Technologies
You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world. -
4
Artix
OpenText
Artix by OpenText is a flexible, easy to deploy integration solution that enables organizations to rapidly build, deploy, and manage highly secure services in either C++ or Java. Artix can be used as a full Enterprise Service Bus (ESB) solution or to help modernize existing investments, bringing new opportunities and revenue models to your business. Artix is a natural extension to any CORBA deployment. Through Artix, your existing CORBA applications can interoperate with non-CORBA technologies without any modification or change in functionality. Containing the market leading Orbix 6 runtime, Artix provides an enterprise-grade quality of service that traverses technical boundaries. Artix creates a peer-to-peer network of smart, standards-based endpoints using existing infrastructure, so enterprises can begin with low-risk, high-value SOA projects and gradually add services as needed. -
5
RSA ID Plus
RSA Security
Powerful cloud solutions to support your digital transformation at your own pace — tailored to fit every identity and access management requirement. ID Plus also includes the new, multi-functional DS100 hardware authenticator. All plans can be flexibly deployed in the cloud, on-prem or hybrid. And all can be easily adjusted as your needs change. Try ID Plus cloud multi-factor authentication (MFA) solution — one of the most secure products on the market, and the world’s most deployed MFA. Find out why: sign up for our free 2-week trial. -
6
HPE Pointnext
Hewlett Packard
This confluence put new demands on HPC storage as the input/output patterns of both workloads could not be more different. And it is happening right now. A recent study of the independent analyst firm Intersect360 found out that 63% of the HPC users today already are running machine learning programs. Hyperion Research forecasts that, at current course and speed, HPC storage spending in public sector organizations and enterprises will grow 57% faster than spending for HPC compute for the next three years. Seymour Cray once said, "Anyone can build a fast CPU. The trick is to build a fast system.” When it comes to HPC and AI, anyone can build fast file storage. The trick is to build a fast, but also cost-effective and scalable file storage system. We achieve this by embedding the leading parallel file systems into parallel storage products from HPE with cost effectiveness built in. -
7
Optiv Managed XDR
Optiv
Attackers are stealthy, relentless and motivated, and might use the same tools you do. They hide in your environment and quickly expand access. We understand the cyber ecosystem because it’s where we live, it’s where we operate. Our MXDR solution’s secret sauce derives from that pedigree, tested processes, proven IP, best-of-breed technology, leveraged automation and providing top-shelf talent to manage it all. Let’s collaborate and develop a custom solution with comprehensive threat visibility, accelerated incident identification, investigation, triage and mitigation actions to protect your enterprise from attacks and threats. We’ll start with your existing investments in endpoint, network, cloud, email and OT/IoT tools. Our experts will get those on the same team, actual technology orchestration! Reduces the attack surface, detects threats faster and automates deep investigation through a continuous approach. -
8
Remark Classic OMR
Remark
When using traditional OMR scanners, Remark Classic OMR® scanning software provides an easy interface for scanning and then analyzing your tests or surveys. Data and reports are flexible and compatible with most other analysis applications. The Remark Classic OMR® software scans and processes data from tests, assessments, surveys and other forms. The software is combined with an OMR (Optical Mark Recognition) scanner to recognize filled-in marks on forms (“fill in the bubble” forms), which automates the data collection process. This software gives you the great data collection, test grading, and survey analysis features of Remark Office OMR, but works with traditional OMR scanners and preprinted forms from Scantron, Chatsworth Data, Sekonic, Apperson and DATAWIN. Remark Classic OMR is very flexible in that it can work with most any form that works with a traditional OMR scanner. -
9
DXC Cloud
DXC Technology
Make the right technology investments at the right time and on the right platforms to drive innovation, increase customer loyalty and grow your business. Get the business outcomes you expect. When cloud is done right, it can provide up to three times the return on investment and faster business results, with less cost, risk and disruption. DXC helps you make the right decisions about what applications to migrate to cloud and when. With DXC Cloud services, you can maximize your use of data and ensure your environment remains secure. We understand the role cloud plays in mission-critical IT because we manage hybrid IT environments for many of the world’s largest companies. Our cloud migration services move 65,000 workloads to cloud each year. We’ve modernized hundreds of mainframe systems and transformed 15,000+ applications to cloud. Let us help you define, execute and manage your cloud strategy. Partner with DXC to do cloud right. -
10
CyberArk Conjur
CyberArk
A seamless open source interface to securely authenticate, control and audit non-human access across tools, applications, containers and cloud environments via robust secrets management. Secrets grant access to applications, tools, critical infrastructure and other sensitive data. Conjur secures this access by tightly controlling secrets with granular Role-Based Access Control (RBAC). When an application requests access to a resource, Conjur authenticates the application, performs an authorization check against the security policy and then securely distributes the secret. Security policy as code is the foundation of Conjur. Security rules are written in .yml files, checked into source control, and loaded onto the Conjur server. Security policy is treated like any other source control asset, adding transparency and collaboration to the organization’s security requirements.
- Previous
- You're on page 1
- Next