18 Integrations with Comarch Social Mining
View a list of Comarch Social Mining integrations and software that integrates with Comarch Social Mining below. Compare the best Comarch Social Mining integrations as well as features, ratings, user reviews, and pricing of software that integrates with Comarch Social Mining. Here are the current Comarch Social Mining integrations in 2026:
-
1
Microsoft 365
Microsoft
Microsoft 365 for Individuals is a complete productivity suite that combines powerful applications, secure cloud storage, and AI-driven tools to help users achieve more in their daily lives. It integrates popular apps like Word, Excel, PowerPoint, Outlook, OneNote, and OneDrive, all enhanced with Copilot—Microsoft’s intelligent AI companion. The platform enables seamless collaboration, creativity, and organization across devices, including PC, Mac, iPhone, iPad, and Android. With Microsoft Designer, users can create stunning visuals, while Clipchamp adds professional-grade video editing capabilities. Built-in Microsoft Defender provides advanced security for personal data and devices. Microsoft 365 empowers individuals to imagine, create, and accomplish with greater efficiency and confidence.Starting Price: $9.99/month -
2
IBM Cloud
IBM
IBM Cloud® capabilities enable business agility and resiliency. Explore the platform that gives you 2.5x value. Designed for industry, security and the freedom to build and run anywhere. Business workflow transformation with automation and AI. Strong technology partner ecosystem that delivers value for industry needs. Industry and business domain expertise and solutions. Automated and auditable processes. Unique capabilities for the highest levels of cloud security and monitoring. Consistent security and controls posture across all applications. Containerized capabilities for DevOps, automation, data and security. Ease of integration and a consistent application development lifecycle. Advanced technologies including IBM Watson®, analytics, IoT, and edge. -
3
Palo Alto Networks Next-Generation Firewalls
Palo Alto Networks
Palo Alto Networks offers ML-powered Next-Generation Firewalls (NGFW) that use inline deep learning to detect and stop the most evasive and unknown zero-day threats. These firewalls provide zero-delay signature updates, ensuring threats are blocked within seconds across the network. The platform delivers detailed visibility into IoT and connected devices, profiling them accurately to prevent unmanaged access. With AI-driven operations, it maximizes security effectiveness while minimizing downtime and resource costs. Recognized as a leader by industry analysts like Forrester, Palo Alto Networks’ NGFWs protect organizations of all sizes and complexities. They support a wide range of deployment environments including branch offices, data centers, public cloud, and 5G networks under a unified security architecture. -
4
Cisco ACI
Cisco
Achieve resource elasticity with automation through common policies for data center operations. Extend consistent policy management across multiple on-premises and cloud instances for security, governance, and compliance. Get business continuity, disaster recovery, and highly secure networking with a zero-trust security model. Transform Day 2 operations to a more proactive model and automate troubleshooting, root-cause analysis, and remediation. Optimizes performance, and single-click access facilitates automation and centralized management. Extend on-premises ACI networks into remote locations, bare-metal clouds, and colocation providers without hardware. Cisco's Multi-Site Orchestrator offers provisioning and health monitoring, and manages Cisco ACI networking policies, and more. This solution provides automated network connectivity, consistent policy management, and simplified operations for multicloud environments. -
5
Airstack
Lenovo
Get your teams and tools on the same page. Airstack makes it easy for teams to organize and share digital tools across the business, so everyone can get visibility into what apps you have and how to use them. Organize your digital tools into an internal app catalog or stacks to share with others. Airstack will automatically pull in logos, links and descriptions for tens of thousands of apps. Get everyone on the same page about your tech by inviting them to see what you have, and share what they have with others. Add everything you need to know about any app - SaaS subscription management data, employee training, links to reports, video walkthroughs. All that critical expertise now has a home. Airstack gets better as more and more teams join in. Get total visibility into what's in your tech stack - kind of like an org chart for your software.Starting Price: $99 per user per month -
6
ArcGIS
ESRI
Mapping and analysis, location intelligence for everyone. Part of the Esri Geospatial Cloud, ArcGIS Online enables you to connect people, locations, and data using interactive maps. Work with smart, data-driven styles and intuitive analysis tools that deliver location intelligence. Share your insights with the world or specific groups. Build interactive maps that explain your data and encourage users to explore. Map your own data and gain perspective by adding the authoritative location-based data included in ArcGIS Online. Use smart mapping to guide your data exploration and visualization. Share your maps with specific groups or everyone. Create web apps with your maps for a focused, interactive experience. Then integrate the apps you built into your digital presence including your website, social media posts, and blog articles.Starting Price: $100 per year -
7
EGrAMS
HTC Global Services
Managing a grant lifecycle can be tedious, time-consuming, and also stressful, given the frequent changes in requirements and regulations. But a comprehensive and easy-to-use solution can make the task of grants management lighter.HTC’s EGrAMS (Electronic Grants Administration and Management System) is just that solution. It is a web-based, enterprise-grade, end-to-end grants administration, and management solution that handles all phases of the grants lifecycle for grantors, with a powerful reporting facility for grantees. EGrAMS improves transparency and accountability by tracking performance in real-time and automatically sending notifications and alerts. Grantors can set up review criteria, score rubrics, collaborate and review for consensus, generate rank lists, and funding recommendations. EGrAMS enables grantors to take charge of the entire grants lifecycle and improve outcomes. -
8
Symantec Advanced Authentication
Broadcom
Mitigate threats and stimulate growth with Advanced Authentication solutions from Symantec. Get real-time protection for your online and mobile applications. Our leading-edge solution can authenticate an employee, partner or contractor while providing a frictionless login experience. This ensures that legitimate users have anytime, anywhere access from any device, which builds trust and brand loyalty. Get a flexible, scalable solution with both strong multi-factor authentication and risk-based methods like device identification, geolocation and user activity. Catastrophic cyber attacks are happening every day. We make sure you’re prepared to defend your business. Earn customer trust and loyalty by providing the simple, seamless experience they’re looking for. With the right data, you can more easily distinguish between legitimate and fraudulent behavior. -
9
Veritas NetBackup
Veritas Technologies
Optimized for the multicloud, extensive workload support, and ensured operational resiliency. Ensure data integrity, monitor your environment, and recover at scale to optimize your resilience. Resiliency. Migration. Snapshot orchestration. Disaster recovery. Unified, end-to-end deduplication. One solution manages it all. The most VMs protected, recovered, and moved to the cloud. Protect VMware, Microsoft Hyper-V, Nutanix AHV, Red Hat Virtualization, AzureStack and OpenStack with automated protection and instant access to VM data via flexible recovery. At-scale disaster recovery with near-zero RPO and RTO. Protect your data with 60+ public cloud storage targets, an automated, SLA-driven resiliency platform, and a new supported integration with NetBackup. Get scale-out protection for petabyte-scale workloads with hundreds of data nodes. Use NetBackup Parallel Streaming, a modern parallel streaming agentless architecture. -
10
Oracle Cloud Infrastructure
Oracle
Oracle Cloud Infrastructure supports traditional workloads and delivers modern cloud development tools. It is architected to detect and defend against modern threats, so you can innovate more. Combine low cost with high performance to lower your TCO. Oracle Cloud is a Generation 2 enterprise cloud that delivers powerful compute and networking performance and includes a comprehensive portfolio of infrastructure and platform cloud services. Built from the ground up to meet the needs of mission-critical applications, Oracle Cloud supports all legacy workloads while delivering modern cloud development tools, enabling enterprises to bring their past forward as they build their future. Our Generation 2 Cloud is the only one built to run Oracle Autonomous Database, the industry's first and only self-driving database. Oracle Cloud offers a comprehensive cloud computing portfolio, from application development and business analytics to data management, integration, security, AI & blockchain. -
11
VMware Cloud
Broadcom
Build, run, manage, connect and protect all of your apps on any cloud. The Multi-Cloud solutions from VMware deliver a cloud operating model for all applications. Support your digital business initiatives with the world’s most proven and widely deployed cloud infrastructure. Leverage the same skills you use in the data center, while tapping into the depth and breadth of six global hyperscale public cloud providers and 4,000+ VMware Cloud Provider Partners. With hybrid cloud built on VMware Cloud Foundation, you get consistent infrastructure and operations for new and existing cloud native applications, from data center to cloud to edge. This consistency improves agility and reduces complexity, cost and risk. Build, run and manage modern apps on any cloud, meeting diverse needs with on-premises and public cloud resources. Manage both container-based workloads and traditional VM-based workloads on a single platform. -
12
Fortinet SD-WAN
Fortinet
Fortinet is the fastest-growing SD-WAN provider in market share by revenue. Fortinet SD-WAN delivers advanced routing, self-healing capabilities, and flexible security using network firewall or SASE-based cloud-delivered services—all in a single, integrated solution. Fortinet Secure SDWAN (software-defined wide-area network) solution enables enterprises to transform and secure all WAN edges. Leveraging the Security-driven Networking approach that uses one operating system and one centralized management console, enterprises realize superior user experience, enhanced security posture effectiveness with converged networking and security, and achieve operational continuity and efficiency. Fortinet Secure SD-WAN is designed to address modern complexity and threat exposure to support customers critical business needs. It is designed to evolve to future-proof and protect investments as customers embrace a digital-first journey and support work-from-anywhere. -
13
Trend Micro Endpoint Encryption
Trend Micro
Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change. -
14
Huawei FusionStorage
Huawei Technologies
Huawei FusionStorage fully converged cloud storage features massive scale-out capabilities designed for cloud-based architectures. The on-board storage system software combines the local storage resources of standard x86 servers into fully distributed storage pools, allowing a single system to provide block, file, and object storage services to the upper layer. An enterprise can easily obtain the flexibility and efficiency in data storage required to keep up with the ever-changing dynamics of business. Convergence of multiple storage services: Distributed block, file, and object storage services are now fully converged onto one platform with unified hardware and shared resources, simplifying O&M. On-demand resources: Automatic data services and on-demand application-oriented storage resource supplies reduce business TTM from one week to one hour. -
15
Dell EMC NetWorker
Dell Technologies
Use Dell EMC NetWorker software for unified backup and recovery of your enterprise applications and databases. With centralized administration, NetWorker helps you take advantage of the data protection that fits your needs best: deduplication, backup to disk and tape, snapshots, replication, and NAS. NetWorker protects both physical and virtual environments including VMware and Microsoft Hyper-V. Whether you’re protecting applications and data residing within your data center or the public cloud, NetWorker provides the same enterprise-level user experience. With cloud capabilities, NetWorker offers a solution for cloud data protection with optimizations to secure your data everywhere. NetWorker is available as virtual edition or as a component of the Dell EMC Data Protection Suite, which offers you a complete suite of data protection software options. -
16
HPE Consumption Analytics
Hewlett Packard Enterprise
The HPE Consumption Analytics Portal is now the metering and analytics component of HPE GreenLake, the consumption-based IT offering from HPE Pointnext Services that gives you the agility and economics of the public cloud in your own data center. Get granular visibility into your usage and costs with interactive dashboards and a drag-and-drop report experience. Stay on top of IT spending with flexible budgets and a rules-based recommendation engine for consumption-based services. Forecast demand to prevent a shortage from becoming an outage with decision-making power to plan your capacity. he HPE Consumption Analytics Portal is part of HPE GreenLake, delivering even more transparency into how your usage and commitments determine your monthly cost. Get more decision-making power to plan your capacity for best workload performance. -
17
Check Point Quantum Network Security
Check Point Software Technologies
Cyber threats are becoming more sophisticated and harder to detect. Check Point Quantum Network Security provides ultra-scalable protection against Gen V cyber attacks on your network, cloud, data center, IoT and remote users. Check Point Quantum Next Generation Firewall Security Gateways™ combine SandBlast threat prevention, hyper-scale networking, a unified management platform, remote access VPN and IOT security to protect you against the most sophisticated cyber attacks. Delivers the highest-caliber threat prevention with award winning SandBlast Zero Day protection out of the box. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. Integrating the most advanced threat prevention and a consolidated management, our security gateway appliances are designed to prevent any cyber attack, reduce complexity and lower your costs. -
18
Juniper Booking Engine
Juniper
Juniper, your tourism technology partner with the best online solutions that adapt to your business. It is a complete and robust tool, but also flexible: its modular system allows maximum adaptation to the expectations of your company and its turnover. The XML connectivity offered by Juniper is the most extensive in the market, putting at your disposal more than 350 integrations with tourism product suppliers via Webservice. Confirm reservations, make promotions and send the travel voucher to your traveler or your clients, among many other possibilities. Update availability, change prices, sell complementary products, organize the contents of sales channels and package different products dynamically. Manage Yield Management tools, adjust prices and offers according to market conditions. Offer on your website your own product and / or that of external suppliers simultaneously, allowing your customers to choose from a greater variety of product.
- Previous
- You're on page 1
- Next