21 Integrations with Comarch Business Intelligence
View a list of Comarch Business Intelligence integrations and software that integrates with Comarch Business Intelligence below. Compare the best Comarch Business Intelligence integrations as well as features, ratings, user reviews, and pricing of software that integrates with Comarch Business Intelligence. Here are the current Comarch Business Intelligence integrations in 2026:
-
1
Microsoft 365
Microsoft
Microsoft 365 for Individuals is a complete productivity suite that combines powerful applications, secure cloud storage, and AI-driven tools to help users achieve more in their daily lives. It integrates popular apps like Word, Excel, PowerPoint, Outlook, OneNote, and OneDrive, all enhanced with Copilot—Microsoft’s intelligent AI companion. The platform enables seamless collaboration, creativity, and organization across devices, including PC, Mac, iPhone, iPad, and Android. With Microsoft Designer, users can create stunning visuals, while Clipchamp adds professional-grade video editing capabilities. Built-in Microsoft Defender provides advanced security for personal data and devices. Microsoft 365 empowers individuals to imagine, create, and accomplish with greater efficiency and confidence.Starting Price: $9.99/month -
2
IBM Cloud
IBM
IBM Cloud® capabilities enable business agility and resiliency. Explore the platform that gives you 2.5x value. Designed for industry, security and the freedom to build and run anywhere. Business workflow transformation with automation and AI. Strong technology partner ecosystem that delivers value for industry needs. Industry and business domain expertise and solutions. Automated and auditable processes. Unique capabilities for the highest levels of cloud security and monitoring. Consistent security and controls posture across all applications. Containerized capabilities for DevOps, automation, data and security. Ease of integration and a consistent application development lifecycle. Advanced technologies including IBM Watson®, analytics, IoT, and edge. -
3
Palo Alto Networks Next-Generation Firewalls
Palo Alto Networks
Palo Alto Networks offers ML-powered Next-Generation Firewalls (NGFW) that use inline deep learning to detect and stop the most evasive and unknown zero-day threats. These firewalls provide zero-delay signature updates, ensuring threats are blocked within seconds across the network. The platform delivers detailed visibility into IoT and connected devices, profiling them accurately to prevent unmanaged access. With AI-driven operations, it maximizes security effectiveness while minimizing downtime and resource costs. Recognized as a leader by industry analysts like Forrester, Palo Alto Networks’ NGFWs protect organizations of all sizes and complexities. They support a wide range of deployment environments including branch offices, data centers, public cloud, and 5G networks under a unified security architecture. -
4
Alumio
Alumio
Alumio is a cloud-native, config-first integration platform that helps rapidly connect multiple systems, cloud apps, SaaS, and data sources for digital growth. It provides a user-friendly web interface that both developers and business users can collaborate on to create, manage, and monitor all integrations, without the costs and hassles of custom code. At the same time, Alumio provides advanced transformers to modify data flexibly and helps automate complex workflows to accelerate business processes and reduce operational costs. Providing prebuilt connectors and quick data mapping features, Alumio helps swiftly integrate e-commerce, ERP, PIM, CRM, WMS, marketing automation systems, AI tools, or even custom endpoints. Additionally, being an API-driven integration platform, Alumio also supports future-proof frameworks like Composable Commerce, and the latest AI connectivity standards. Above all, Alumio helps businesses build scalable, future-proof ecosystems.Starting Price: €999 per month -
5
Cisco ACI
Cisco
Achieve resource elasticity with automation through common policies for data center operations. Extend consistent policy management across multiple on-premises and cloud instances for security, governance, and compliance. Get business continuity, disaster recovery, and highly secure networking with a zero-trust security model. Transform Day 2 operations to a more proactive model and automate troubleshooting, root-cause analysis, and remediation. Optimizes performance, and single-click access facilitates automation and centralized management. Extend on-premises ACI networks into remote locations, bare-metal clouds, and colocation providers without hardware. Cisco's Multi-Site Orchestrator offers provisioning and health monitoring, and manages Cisco ACI networking policies, and more. This solution provides automated network connectivity, consistent policy management, and simplified operations for multicloud environments. -
6
AirStar
Abservetech
Airbnb Clone is an online rental marketplace application between the host and the travelers. A host can list their place and rent it to the travelers. Therefore, they can earn money with it easily. In short, By using our Airbnb Clone script, an entrepreneur or startup company can start their own vacation rental business like Airbnb instantly.Starting Price: $500.00/one-time -
7
ArcGIS
ESRI
Mapping and analysis, location intelligence for everyone. Part of the Esri Geospatial Cloud, ArcGIS Online enables you to connect people, locations, and data using interactive maps. Work with smart, data-driven styles and intuitive analysis tools that deliver location intelligence. Share your insights with the world or specific groups. Build interactive maps that explain your data and encourage users to explore. Map your own data and gain perspective by adding the authoritative location-based data included in ArcGIS Online. Use smart mapping to guide your data exploration and visualization. Share your maps with specific groups or everyone. Create web apps with your maps for a focused, interactive experience. Then integrate the apps you built into your digital presence including your website, social media posts, and blog articles.Starting Price: $100 per year -
8
Buybox
Buybox
BuyBox is an all-in-one SaaS platform for creating, managing, and optimizing digital and omnichannel gift card programs for both consumers (B2C) and businesses (B2B), plus tools for distributing gift cards through one of Europe’s largest brand and reseller networks. It provides unified features to design gift card journeys, automate code generation and activation, monitor business performance in real time, and analyze actionable data to adjust strategies that maximize profitability and revenue from gift cards. BuyBox integrates natively with major content management systems, payment service providers, and point of sale systems to fit into existing tech stacks with streamlined API connections that are fast to implement. It gives brands complete control of customer knowledge by linking gift card usage to loyalty and repeat purchase data, and supports fast international deployment across multiple languages and currencies.Starting Price: €750 per month -
9
EGrAMS
HTC Global Services
Managing a grant lifecycle can be tedious, time-consuming, and also stressful, given the frequent changes in requirements and regulations. But a comprehensive and easy-to-use solution can make the task of grants management lighter.HTC’s EGrAMS (Electronic Grants Administration and Management System) is just that solution. It is a web-based, enterprise-grade, end-to-end grants administration, and management solution that handles all phases of the grants lifecycle for grantors, with a powerful reporting facility for grantees. EGrAMS improves transparency and accountability by tracking performance in real-time and automatically sending notifications and alerts. Grantors can set up review criteria, score rubrics, collaborate and review for consensus, generate rank lists, and funding recommendations. EGrAMS enables grantors to take charge of the entire grants lifecycle and improve outcomes. -
10
Symantec Advanced Authentication
Broadcom
Mitigate threats and stimulate growth with Advanced Authentication solutions from Symantec. Get real-time protection for your online and mobile applications. Our leading-edge solution can authenticate an employee, partner or contractor while providing a frictionless login experience. This ensures that legitimate users have anytime, anywhere access from any device, which builds trust and brand loyalty. Get a flexible, scalable solution with both strong multi-factor authentication and risk-based methods like device identification, geolocation and user activity. Catastrophic cyber attacks are happening every day. We make sure you’re prepared to defend your business. Earn customer trust and loyalty by providing the simple, seamless experience they’re looking for. With the right data, you can more easily distinguish between legitimate and fraudulent behavior. -
11
Veritas NetBackup
Veritas Technologies
Optimized for the multicloud, extensive workload support, and ensured operational resiliency. Ensure data integrity, monitor your environment, and recover at scale to optimize your resilience. Resiliency. Migration. Snapshot orchestration. Disaster recovery. Unified, end-to-end deduplication. One solution manages it all. The most VMs protected, recovered, and moved to the cloud. Protect VMware, Microsoft Hyper-V, Nutanix AHV, Red Hat Virtualization, AzureStack and OpenStack with automated protection and instant access to VM data via flexible recovery. At-scale disaster recovery with near-zero RPO and RTO. Protect your data with 60+ public cloud storage targets, an automated, SLA-driven resiliency platform, and a new supported integration with NetBackup. Get scale-out protection for petabyte-scale workloads with hundreds of data nodes. Use NetBackup Parallel Streaming, a modern parallel streaming agentless architecture. -
12
Oracle Cloud Infrastructure
Oracle
Oracle Cloud Infrastructure supports traditional workloads and delivers modern cloud development tools. It is architected to detect and defend against modern threats, so you can innovate more. Combine low cost with high performance to lower your TCO. Oracle Cloud is a Generation 2 enterprise cloud that delivers powerful compute and networking performance and includes a comprehensive portfolio of infrastructure and platform cloud services. Built from the ground up to meet the needs of mission-critical applications, Oracle Cloud supports all legacy workloads while delivering modern cloud development tools, enabling enterprises to bring their past forward as they build their future. Our Generation 2 Cloud is the only one built to run Oracle Autonomous Database, the industry's first and only self-driving database. Oracle Cloud offers a comprehensive cloud computing portfolio, from application development and business analytics to data management, integration, security, AI & blockchain. -
13
VMware Cloud
Broadcom
Build, run, manage, connect and protect all of your apps on any cloud. The Multi-Cloud solutions from VMware deliver a cloud operating model for all applications. Support your digital business initiatives with the world’s most proven and widely deployed cloud infrastructure. Leverage the same skills you use in the data center, while tapping into the depth and breadth of six global hyperscale public cloud providers and 4,000+ VMware Cloud Provider Partners. With hybrid cloud built on VMware Cloud Foundation, you get consistent infrastructure and operations for new and existing cloud native applications, from data center to cloud to edge. This consistency improves agility and reduces complexity, cost and risk. Build, run and manage modern apps on any cloud, meeting diverse needs with on-premises and public cloud resources. Manage both container-based workloads and traditional VM-based workloads on a single platform. -
14
Fortinet SD-WAN
Fortinet
Fortinet is the fastest-growing SD-WAN provider in market share by revenue. Fortinet SD-WAN delivers advanced routing, self-healing capabilities, and flexible security using network firewall or SASE-based cloud-delivered services—all in a single, integrated solution. Fortinet Secure SDWAN (software-defined wide-area network) solution enables enterprises to transform and secure all WAN edges. Leveraging the Security-driven Networking approach that uses one operating system and one centralized management console, enterprises realize superior user experience, enhanced security posture effectiveness with converged networking and security, and achieve operational continuity and efficiency. Fortinet Secure SD-WAN is designed to address modern complexity and threat exposure to support customers critical business needs. It is designed to evolve to future-proof and protect investments as customers embrace a digital-first journey and support work-from-anywhere. -
15
Trend Micro Endpoint Encryption
Trend Micro
Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change. -
16
Huawei FusionStorage
Huawei Technologies
Huawei FusionStorage fully converged cloud storage features massive scale-out capabilities designed for cloud-based architectures. The on-board storage system software combines the local storage resources of standard x86 servers into fully distributed storage pools, allowing a single system to provide block, file, and object storage services to the upper layer. An enterprise can easily obtain the flexibility and efficiency in data storage required to keep up with the ever-changing dynamics of business. Convergence of multiple storage services: Distributed block, file, and object storage services are now fully converged onto one platform with unified hardware and shared resources, simplifying O&M. On-demand resources: Automatic data services and on-demand application-oriented storage resource supplies reduce business TTM from one week to one hour. -
17
InterCloud
InterCloud
As your enterprise applications are more widely distributed, the demand for flexibility, performance, security and control is higher than ever. InterCloud is the only software-defined cloud interconnect provider delivering a secure, end-to-end managed service. Our API-first platform simplifies and accelerates your network operations, offering enhanced performance and visibility. As a privileged partner of the major cloud service providers (CSPs), we provide optimized connectivity solutions tailored to your organization’s needs. To connect your business-critical applications, InterCloud guarantees end-to-end security and performance of your traffic from your premises to your cloud environments using CSPs’ private connectivity services. To optimize the performance of your business applications accessed via the Internet, InterCloud manages Internet exchange peering design and implementation. -
18
Dell EMC NetWorker
Dell Technologies
Use Dell EMC NetWorker software for unified backup and recovery of your enterprise applications and databases. With centralized administration, NetWorker helps you take advantage of the data protection that fits your needs best: deduplication, backup to disk and tape, snapshots, replication, and NAS. NetWorker protects both physical and virtual environments including VMware and Microsoft Hyper-V. Whether you’re protecting applications and data residing within your data center or the public cloud, NetWorker provides the same enterprise-level user experience. With cloud capabilities, NetWorker offers a solution for cloud data protection with optimizations to secure your data everywhere. NetWorker is available as virtual edition or as a component of the Dell EMC Data Protection Suite, which offers you a complete suite of data protection software options. -
19
HPE Consumption Analytics
Hewlett Packard Enterprise
The HPE Consumption Analytics Portal is now the metering and analytics component of HPE GreenLake, the consumption-based IT offering from HPE Pointnext Services that gives you the agility and economics of the public cloud in your own data center. Get granular visibility into your usage and costs with interactive dashboards and a drag-and-drop report experience. Stay on top of IT spending with flexible budgets and a rules-based recommendation engine for consumption-based services. Forecast demand to prevent a shortage from becoming an outage with decision-making power to plan your capacity. he HPE Consumption Analytics Portal is part of HPE GreenLake, delivering even more transparency into how your usage and commitments determine your monthly cost. Get more decision-making power to plan your capacity for best workload performance. -
20
Check Point Quantum Network Security
Check Point Software Technologies
Cyber threats are becoming more sophisticated and harder to detect. Check Point Quantum Network Security provides ultra-scalable protection against Gen V cyber attacks on your network, cloud, data center, IoT and remote users. Check Point Quantum Next Generation Firewall Security Gateways™ combine SandBlast threat prevention, hyper-scale networking, a unified management platform, remote access VPN and IOT security to protect you against the most sophisticated cyber attacks. Delivers the highest-caliber threat prevention with award winning SandBlast Zero Day protection out of the box. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. Integrating the most advanced threat prevention and a consolidated management, our security gateway appliances are designed to prevent any cyber attack, reduce complexity and lower your costs. -
21
Juniper Booking Engine
Juniper
Juniper, your tourism technology partner with the best online solutions that adapt to your business. It is a complete and robust tool, but also flexible: its modular system allows maximum adaptation to the expectations of your company and its turnover. The XML connectivity offered by Juniper is the most extensive in the market, putting at your disposal more than 350 integrations with tourism product suppliers via Webservice. Confirm reservations, make promotions and send the travel voucher to your traveler or your clients, among many other possibilities. Update availability, change prices, sell complementary products, organize the contents of sales channels and package different products dynamically. Manage Yield Management tools, adjust prices and offers according to market conditions. Offer on your website your own product and / or that of external suppliers simultaneously, allowing your customers to choose from a greater variety of product.
- Previous
- You're on page 1
- Next