26 Integrations with AMI Data Center Manager
View a list of AMI Data Center Manager integrations and software that integrates with AMI Data Center Manager below. Compare the best AMI Data Center Manager integrations as well as features, ratings, user reviews, and pricing of software that integrates with AMI Data Center Manager. Here are the current AMI Data Center Manager integrations in 2026:
-
1
Boon
Boon
Built by experienced TA professionals, Boon is the world’s most agile referral hiring platform that scales across your entire community to deliver better hires, faster. While legacy referral platforms take up to eight weeks to implement, Boon starts delivering results within days. We accomplish this through seamless integrations, swift onboarding, and flexible contracts that are designed to scale with your business. Once you're up and running watch as your referral program magically scales itself through the power of automation, AI-driven recommendations, and advanced engagement features. Boon companies hire 52% faster, source 5x more referrals, and save 40% per hire.Starting Price: $499/month -
2
Telegraf
InfluxData
Telegraf is the open source server agent to help you collect metrics from your stacks, sensors and systems. Telegraf is a plugin-driven server agent for collecting and sending metrics and events from databases, systems, and IoT sensors. Telegraf is written in Go and compiles into a single binary with no external dependencies, and requires a very minimal memory footprint. Telegraf can collect metrics from a wide array of inputs and write them into a wide array of outputs. It is plugin-driven for both collection and output of data so it is easily extendable. It is written in Go, which means that it is a compiled and standalone binary that can be executed on any system with no need for external dependencies, no npm, pip, gem, or other package management tools required. With 300+ plugins already written by subject matter experts on the data in the community, it is easy to start collecting metrics from your end-points.Starting Price: $0 -
3
Axonius
Axonius
Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action. -
4
Aruba Cloud Monitoring
Aruba Cloud
With the Cloud Monitoring service, it is possible to monitor all your websites, Cloud Servers, dedicates servers whether they are hosted in the Aruba Cloud data centers or with other providers. In cases of failures or errors detected in the monitored resource or service, Cloud Monitoring will automatically and immediately send you a notification via email or SMS, so you can always know the progress of your infrastructure in real time and if need be, take action as soon as possible. By using the charts found in the Cloud Monitoring control panel you can quickly register and analyze all the activity of the monitored services, and easily identify any problem and see how it repeats during the course of time. Through the Cloud Monitoring Control Panel, it is possible to setup checks and alerts to warn you when a service is not active. All of this makes Cloud Monitoring an essential service for managing your services.Starting Price: €2.99 per month -
5
Systweak Advanced System Protector
Systweak
Advanced System Protector comes with a powerful engine that systematically scans and removes all infections and malicious files to keep your data secure. Advanced System Protector is loaded with features for complete protection. Clean 100% of detected threats for seamless browsing and computing experience. Just click start scan now to detect & remove infections from your PC. Ensure thorough cleaning with quick, deep & custom scan modes. Advanced System Protector not only keeps malware and infections at bay but also protects your personal information from falling into wrong hands. Detects and removes unwanted adware & toolbars to secure your data. Suspicious files are isolated from other files to prevent the further spread of infection. Deletes browser cookies and internet browsing history for privacy. Keep your system protected against malicious threats and PUPs that cause slowdowns to enhance system performance and make it more stable.Starting Price: $39 one-time payment -
6
Staqu JARVIS
Staqu
Get real-time alerts based on centralized monitoring for safety, security, and operations on your existing camera. JARVIS is an audio-video analytics and management technology platform that has changed how people think about security cameras. It is the new technique of creating meaningful information from long CCTV video footage with short and crisp real-time alerts utilizing AI and computer vision. Fueled with artificial intelligence, patented technologies, and unique capabilities, JARVIS offers innovation for security and the best possible solution for business. JARVIS uses AI to help enterprises automate their safety, security, and operations, notably in the manufacturing, retail, and infrastructure sectors. With seamless integration, it can easily adapt to your business, and provide actionable intelligence through data-driven insights. JARVIS provides a user-friendly dashboard that will help you monitor critical incidents and take action on them.Starting Price: Free -
7
Strategyzer
Strategyzer
Build an Invincible Company Stop risking your future with business as usual. Uncover your teams’ entrepreneurial potential with our globally-trusted methodology and engaging platform. Enterprise teams can train at our Cloud Academy or create a successful Corporate Innovation Ecosystem with the Growth Portfolio. Our purpose is to unlock millions of people’s potential to create value for themselves, organizations, and society. We succeed when inspired people find the clarity to drive healthy growth and build invincible companies worldwide. To make this happen, we’ve designed the global standard and platform for universal business challenges. We shift mindsets to transform strategic innovation, organization, and culture. Centralize your strategy and innovation workflow for better collaboration, increased transparency, and improved rate of success. Learn how to explore and manage new business ideas and pivot existing business models to avoid disruption.Starting Price: $25 per month -
8
Junos Traffic Vision
Juniper Networks
Junos Traffic Vision is a licensed traffic sampling application for MX Series 3D Universal Edge Routers. It provides details on network traffic flows that is useful for a wide variety of operations and planning activities. Junos Traffic Vision monitors packets as they are processed by the router, and captures details such as source and destination addresses, packet and byte count information. These details are aggregated and exported in a standards-based format for analysis and presentation by Juniper and third-party-based tools that support usage-based accounting, traffic profiling, traffic engineering, attack and intrusion detection, and SLA monitoring. Implemented inline and on service cards that provide high performance and scale, Junos Traffic Vision can be deployed in both active and passive configurations and can take place alongside lawful intercept filtering and port mirroring without impacting performance. -
9
Storidge
Storidge
Storidge was built on the idea that operating storage for enterprise applications should be really simple. We take a fundamentally different approach to Kubernetes storage and Docker volumes. By automating storage operations for orchestration systems, such as Kubernetes and Docker Swarm, it saves you time and money by eliminating the need for expensive expertise to setup, and operate storage infrastructure. This enables developers to focus their best energies on writing applications and creating value, and operators on delivering the value faster to market. Add persistent storage to your single node test cluster in seconds. Deploy storage infrastructure as code, and minimize operator decisions while maximizing operational workflow. Automated updates, provisioning, recovery, and high availability. Keep your critical databases and apps running with auto failover and automatic data recovery. -
10
WEKA
WEKA
WEKA provides a high-performance data platform optimized for AI and machine learning, offering scalable solutions for businesses and research labs. With the ability to handle vast amounts of data across on-premises, cloud, and hybrid environments, WEKA accelerates data workflows, enabling faster AI training, inference, and high-performance computing (HPC). The platform features infinite scalability, simplifying data storage, and providing seamless access to data across multiple locations. WEKA's environmentally conscious approach minimizes energy consumption, making it ideal for organizations aiming for both performance and sustainability in AI-driven projects. -
11
Cubed Mobile
Cubed Mobile
End-to-end mobile security is made simple. Get the protection you need for your growing business in two simple steps. Cubed Mobile frees your employees from the need for a second device and/or second SIM while creating a secured separation between personal and business workspaces. Keep sensitive data safe and isolated in a secure environment. Ensure employees only connect to secure Wi-Fi networks. Empower your team to access the Internet securely. Protect against network, apps, privilege abuse, and advanced attacks. Strengthen security, smooth communication coordination, and ease management of BYOD with a new approach that anyone can set it up in two minutes! Create workspaces with different settings, apps, and access-rights based on user parameters. Let your admins invite and remove users, edit personal details, settings, and virtual lines, and filter lists of associated devices. Anytime you can remotely backup, restore, and wipe entire workspaces immediately.Starting Price: Free -
12
IBM watsonx.data
IBM
Put your data to work, wherever it resides, with the open, hybrid data lakehouse for AI and analytics. Connect your data from anywhere, in any format, and access through a single point of entry with a shared metadata layer. Optimize workloads for price and performance by pairing the right workloads with the right query engine. Embed natural-language semantic search without the need for SQL, so you can unlock generative AI insights faster. Manage and prepare trusted data to improve the relevance and precision of your AI applications. Use all your data, everywhere. With the speed of a data warehouse, the flexibility of a data lake, and special features to support AI, watsonx.data can help you scale AI and analytics across your business. Choose the right engines for your workloads. Flexibly manage cost, performance, and capability with access to multiple open engines including Presto, Presto C++, Spark Milvus, and more. -
13
LynxOS
Lynx Software Technologies
LynxOS has been deployed in millions of embedded devices and has operated reliably for 30+ years across multiple safety and security-critical embedded markets. It is a tried and true approach for hosting applications on a Unix-like OS model wherein all resources and application services are centrally managed by a common kernel and is best-suited for working with hardware architectures that predate virtualization. We want our customers to buy what they need, and only what they need. Real-time operating systems can provide a tremendous amount of value, but they are not required for every embedded system design. For a more complete listing of our RTOS-related resources, visit our Embedded Systems Learning Center, which is filled with helpful material for making software purchase decisions as you design or update your system and consider which real-time platform vendor is right for you. -
14
Truyo
Truyo
From consent to privacy rights automation, Truyo provides you with the tools and platform to create better privacy experiences for consumers, employees, service providers, and privacy teams. Provide a best-in-class privacy rights management solution to consumers, privacy teams, and service providers. Automate your consumers' requests for access, deletion, correction, and Do Not Sell. The Truyo solution scales to meet your needs. Whether you need something simple or full automation, Truyo has you covered. Provide transparency and build trust with your users by giving them the tools to manage consent. By simply installing some JavaScript code to your website you’ll be set up to intelligently block third-party cookies and display consent prompts to become compliant with current and emerging data privacy laws while putting the user in control. Users will have access to a customized page to manage their data preferences which can be passed across all brands. -
15
VAST Data
VAST Data
Unprecedented customer adoption establishes VAST among today's elite technology companies in just 2 short years. Leading organizations around the world use Universal Storage to eliminate storage tiering and unleash insights on vast reserves of data. Learn how you can easily and securely store all your data on exabyte-scale, affordable flash. We're simplifying data storage and redefining how organizations interact with data by breaking decades of tradeoffs. We look past the marginal gain and apply unconventional thinking in order to break decades of tradeoffs that have been imposed by legacy architectures. Our mission is to bring an end to decades of complexity and application bottlenecks. VAST combines a series of innovations to radically change the flash cost vs. capacity equation, democratizing the utility of flash for all data and all applications. The result: no more slow and failure-prone hard drives, no more complex storage tiers. -
16
SentryPoint Security Suite
Synaptics
Biometrics-based security, such as fingerprint authentication, is proven to be both more secure and convenient than passwords, making fingerprint sensing an increasingly common, and product-differentiating, feature in smartphones, tablets and PCs. However, fingerprint authentication also raises security concerns that can best be addressed with protections purpose-built for biometrics. Synaptics helps ensure biometric data protection through the SentryPoint Security Suite of features and architectures that accommodate the full range of market needs. This one-way conversion of biometric data into a proprietary template format prevents recreation, reverse-engineering or use for unintended purposes, thereby protecting the user from identity theft. All biometric data is encrypted and digitally signed using strong 256-bit Advanced Encryption Standard and Transport Layer Security technologies to prevent eavesdropping, tampering or fraud. -
17
Ionic Machina
Ionic
Data security is managed in silos, but sensitive data traverses multiple applications, environments, data stores, and devices. This makes it challenging to scale data security and implement consistent access controls. Machina is your agile and dynamic authorization solution that easily handles modern challenges. Manage your shared responsibility to secure data at rest and in transit in the cloud and on-prem. Track how data is handled and accessed; audit how policies are enforced across your organization. Deliver context-aware dynamic authorization for each access request to maintain least privilege. Abstract access logic from app code to orchestrate policy enforcement across multiple environments. Implement and enforce consistent access policies in real-time across applications, repositories, workloads, and services. Monitor and analyze data handling and policy enforcement across your enterprise, and generate audit-ready proof of compliance. -
18
Netvisor ONE
Pluribus Networks
Moving to Open Networking bare metal switches brings significant operational and financial benefits to build next-generation networks. These switches provide the capacity needed to achieve cloud-scale, agility, elasticity, and adaptability. As you move to a disaggregated open networking strategy, selecting the right Network Operating System (OS) is a critical success factor. Why? The Network OS deployed unlocks the performance, functionality, and services from Open Networking switches to realize the most value. Netvisor® ONE is an open, secure, and programable next-generation Network OS that is purpose-built to optimize the power and performance of bare metal Open Networking hardware. Deployment-proven in production mission-critical enterprise and carrier networks, Netvisor ONE operating system meets the most stringent performance requirements and delivers the maximum levels of reliability and flexibility at scale, and without compromise. -
19
Duality
Duality Technologies
Duality Technologies provides a cutting-edge privacy-enhancing platform that enables organizations to securely analyze and collaborate on sensitive, distributed data without exposing or moving it. Using advanced Privacy Enhancing Technologies (PETs) such as fully homomorphic encryption and federated learning, Duality allows AI models and analytics to run safely on encrypted data. The platform supports secure data sharing across borders and organizational silos while maintaining strict compliance and data sovereignty. Duality’s solutions empower industries like financial services, healthcare, and government to generate insights, accelerate innovation, and minimize risk. Customers benefit from seamless integration with major cloud providers and enterprise partners including AWS, Azure, and Google. By safeguarding data throughout the entire data science lifecycle, Duality unlocks new possibilities for privacy-first collaborative research and AI. -
20
MBX Hatch
MBX Systems
Hatch software revolutionizes hardware execution by transforming how hardware teams work. Purpose-built for the complexities of hardware management, Hatch blends disparate operational roles into a collaborative team, providing the tools and transparency to plan, manage, deploy, and support hardware solutions for improved execution, all within a single platform. Configurable products mean choices without challenges. Easily customize product configurations for each customer using a single BOM containing pre-defined component groupings for thousands of potential hardware permutations you can choose at the push of a button. Oversee engineering changes in a traceable repository. Every description, due date, status, review, and approval is consolidated in one spot. Say goodbye to archaic spreadsheets, errant emails, and extraneous applications. Tracking work in process in real-time down to the work center allows you to accurately update customers for orders in process. -
21
VIOLIN Maestro OS
VIOLIN
Demanding enterprises worldwide depend on storage that can deliver results. The storage operating system for the next generation is here now with Maestro OS. Valuable enterprise data needs protection with enterprise data services. Meanwhile, the business requires any new storage to be cost-effective. Complex enterprise workloads demand performance that is more than a point solution. VIOLIN's Maestro OS delivers all of this and more. Synchronous replication, WAN-optimized replication, and consistency groups for replication. Snapshots (crash consistent), consistency groups for snapshots, transparent LUN mirroring, and backup app integration. Scale-up to 737.28 TB raw, online expansion of capacity, and online LUN expansion. Start now by connecting with our experts to assess your storage needs. See how the QV-Series works with a quick setup of an online test environment. Partner with the right team to start driving down your total cost of ownership. -
22
Revelio Labs
Revelio Labs
Explore workforce dynamics like never before. Revelio Labs absorbs and standardizes hundreds of millions of public employment records to create the world's first universal HR database, allowing us to understand the workforce dynamics and trends of any company. The health and stability of companies have traditionally been understood using methods that have relied on indicators of performance. The true inner workings of a company, and its workforce, are notoriously difficult to understand and have yet to be a meaningful part of how companies have been assessed. At Revelio Labs we build the tools that are needed to understand the workforce of every company. By ingesting the universe of public workforce data, we've created a standard structure to unify occupations and job titles, skills and activities, and companies and other organizations. Our team of data scientists uses the latest methods in statistical research to remove sampling bias and anticipate lags in reporting. -
23
Deploy and orchestrate applications on a managed Kubernetes platform with centralized, SaaS-based management of distributed applications with a single pane of glass and rich observability. Simplify by managing deployments as one across on-prem, cloud, and edge locations. Achieve effortless management and scaling of applications across multiple k8s clusters (customer sites or F5 Distributed Cloud Regional Edge) with a single Kubernetes compatible API, unlocking the ease of multi-cluster management. Deploy, deliver, and secure applications to all locations as one ”virtual” location. Deploy, secure, and operate distributed applications with uniform production grade Kubernetes no matter the location, from private and public cloud to edge locations. Secure K8s Gateway with zero trust security all the way to the cluster with ingress services with WAAP, service policies management, network, and application firewall.
-
24
Decentriq
Decentriq
Privacy-minded organizations work with Decentriq. With the latest advancements in encryption and privacy-enhancing technologies such as synthetic data, differential privacy, and confidential computing, your data stays under your control at all times. End-to-end encryption keeps your data private to all other parties. Decentriq cannot see or access your data. Remote attestation gives you verification that your data is encrypted and only approved analyses are running. Built-in partnership with market-leading hardware and infrastructure providers. Designed to handle even advanced AI and machine learning models, the platform keeps your data inaccessible no matter the challenge. With processing speeds approaching typical cloud levels, you don’t have to sacrifice scalability for excellent data protection. Our growing network of data connectors supports more streamlined workflows across leading data platforms. -
25
Eclypsium
Eclypsium
Eclypsium® ensures the health and integrity of enterprise devices at the fundamental firmware and hardware layers that traditional security fails to protect. Eclypsium provides a new layer of security to defend the critical servers, networking gear, and laptops at the heart of every organization. Unlike traditional security that only protects the software layers of a device, Eclypsium brings security to the hardware and firmware. From the earliest boot process to the most fundamental code on a device, Eclypsium finds and fixes the low-level weaknesses and threats that attackers use to defeat traditional security. Get high-fidelity views into all enterprise devices including servers, networking gear, and laptops. Automatically find vulnerabilities and threats in all hardware and firmware components inside each device. See into devices both on-premises or deployed remotely including remote work and BYOD devices. -
26
At times of global economic upheaval, boardrooms are driven to rapidly re-assess strategy, priorities and focus. Some will elect to take a cautious approach while others will seize an unplanned but unique opportunity to drive positive change across their business. Today, there is an unprecedented chance to redefine enterprise; to embed new and more agile ways of working, boost innovation, and enhance customer experiences while, simultaneously, realizing new revenue opportunities, reducing costs and perhaps for the first time, do so at scale. Capgemini Intelligent Automation Platform is a purpose-built, plug and play platform enabling effective IT, applications services and business operations delivery to provide intelligent automation at its full potential for businesses to reap maximum value across the entire operation, seamlessly, and at scale. CIAP enables businesses to move from operations focused, limited value, isolated deployment of automation to an enterprise wide approach.
- Previous
- You're on page 1
- Next