44 Integrations with Dell EMC Avamar

View a list of Dell EMC Avamar integrations and software that integrates with Dell EMC Avamar below. Compare the best Dell EMC Avamar integrations as well as features, ratings, user reviews, and pricing of software that integrates with Dell EMC Avamar. Here are the current Dell EMC Avamar integrations in 2026:

  • 1
    one.com

    one.com

    one.com

    Website tools, hosting, and personalized email all in one plan. We’ll help you every step of the way. Find or transfer your domain name, build your site, and make it a success. Kick-start your success today by registering the perfect domain name. If you already own a domain name, we’ll help you transfer it. Build your website with the simple Website Builder or more advanced WordPress. Create a beautiful, responsive site in just a few steps. Grow your customer base. You’ve put in the effort of creating something you are proud of, and now you want the world to see it. To get you started, all our plans include one free domain for a whole year. Start building your dream online with our easy-to-use website builder. Grow your website traffic with Google Ads. Get 1 month free when you sign up. Our friendly support team is available 24/7, every day of the year. All our plans include a free SSL certificate. Your website is secure from day 1.
    Starting Price: $0.99 per month
    View Software
    Visit Website
  • 2
    Netdata

    Netdata

    Netdata, Inc.

    The open-source observability platform everyone needs! Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: 💥 Collects metrics from 800+ integrations 💪 Real-Time, Low-Latency, High-Resolution 😶‍🌫️ Unsupervised Anomaly Detection 🔥 Powerful Visualization 🔔 Out of box Alerts 📖 systemd Journal Logs Explorer 😎 Low Maintenance ⭐ Open and Extensible Try Netdata today and feel the pulse of your infrastructure, with high-resolution metrics, journal logs and real-time visualizations.
    Leader badge
    Starting Price: Free
  • 3
    Veeam Kasten for Kubernetes
    Leading Kubernetes Data Protection and Mobility Trusted by the world’s largest organizations, Veeam Kasten delivers secure, Kubernetes-native data protection and application mobility for the most complete set of distributions and platforms at enterprise scale. We give operations and application teams the confidence to withstand the unexpected and deliver faster, all without complex scripting, unsupported tools, and legacy solutions.
  • 4
    Zirozen

    Zirozen

    Zirozen

    Zirozen is a unified autonomous endpoint management platform that delivers real‑time visibility and control across your entire IT environment to network equipment and cloud infrastructure, via an intuitive drag‑and‑drop dashboard. Its AI‑powered engine continuously scans for vulnerabilities, misconfigurations, missing patches, and unauthorized software, automatically prioritizing and remediating risks based on severity scores. Zirozen automates cross‑platform patch and configuration management with policy‑driven scheduling, continuous compliance auditing for standards like GDPR, HIPAA, and PCI‑DSS, software metering and license optimization, file integrity monitoring, application control, and malicious activity detection. Deep integrations eliminate tool sprawl by correlating security, asset, and inventory data in one console, while customizable alerts and centralized reporting enable proactive SecOps with reduced mean time to resolution.
  • 5
    RG System

    RG System

    RG System

    Designed for MSPs and IT Professionals, RG System provides a SaaS IT Management platform that combines RMM, Data Backup & Restore and Endpoint Security on a centric portal. With RG System, you protect your whole IT infrastructure - servers, workstations and devices - and you benefit from unique Bitdefender GravityZone Business Security and Dell EMC Avamar integration. Remote access, patch management, ticketing, reporting, VMs backup, replication, firewall... you manage and secure your IT environments from the same web based interface. The portal is affordable, easy-to-use and on a pay as you go model. Make IT Easy, that's what we do!
    Starting Price: $1.50
  • 6
    Paessler PRTG Hosted Monitor
    The coronavirus pandemic has created new challenges for business and for remote IT monitoring. It's good to be able to rely on a proven steady in uncertain times. For 25 years, Paessler has been building software to simplify the lives of IT professionals. Perhaps our most advanced answer to the challenges of the day, Hosted Monitoring. Paessler PRTG Hosted Monitor offers monitoring out of the box. Traffic, applications, availability, bandwidth, all-important technologies are supported. Your PRTG instance is up and running in a very short amount of time compared to any in-house implementation. There’s no need to order new hardware or look for a machine with spare capacity. PRTG Hosted Monitor is agentless and you can start monitoring from your browser right away. We host your PRTG instance on reliable AWS servers in the region of your choice and constant backups go without saying.
    Starting Price: $149 per month
  • 7
    Avast Driver Updater
    Driver Updater detects old, corrupt, missing, or outdated drivers, fixes bugs and vulnerabilities, and backs up and restores current drivers. Faulty and old drivers are the top cause of crashes, freezes, and bluescreens. Driver Updater finds the latest driver versions for max stability and fewer bugs, connection problems, mouse or printer issues, and more. Update graphics drivers to boost performance and enjoy crisper images in games, Virtual Reality, multimedia apps, streaming, and media editing. No sound coming from your speakers? Wi-Fi constantly dropping? Printer suddenly not working? Driver Updater eliminates these interruptions. Our redesigned interface makes it simple to scan and install drivers in just a few clicks, while our new driver engine scans in real-time to make sure you have the latest drivers. Drivers are installed one at a time to avoid hardware conflicts.
    Starting Price: $42.99 per year
  • 8
    Windows Admin Center
    Windows Admin Center is a locally deployed, browser-based management toolset that enables IT administrators to manage Windows Servers, clusters, hyper-converged infrastructure, and Windows 10 or later PCs without the need for cloud connectivity. It serves as the modern evolution of traditional in-box management tools like Server Manager and Microsoft Management Console (MMC), offering a streamlined and integrated experience. Provides a unified interface to manage multiple server environments, including physical, virtual, on-premises, and cloud-based servers, facilitating tasks such as configuration, troubleshooting, and maintenance. Seamlessly extends on-premises deployments to Azure, enabling hybrid management scenarios. This integration allows for the utilization of Azure services like backup, disaster recovery, monitoring, and update management directly through the Windows Admin Center interface.
    Starting Price: $1,176 one-time payment
  • 9
    SUSE Linux Enterprise Real Time
    Whether it’s an IoT sensor monitoring industrial devices or an edge system that must act instantly on external inputs, SUSE Linux Enterprise Real Time is a real time operating system designed to reduce latency and increase the predictability and reliability of time-sensitive, business-critical applications. Banks, manufacturers, government agencies and others rely on time-dependent applications which must execute accurately and predictably all the time, every time. To act as a single unit, distributed systems need time accuracy not only within a server but across all servers. The Precision Time Protocol (PTP) synchronizes servers via the high-speed network, up to sub-microsecond accuracy. Includes support for device interrupt threads, enabling tuning at the device level, and hardware latency detectors to ensure predictability of application behavior. SUSE Linux Enterprise Real Time gives you the time advantage you need to beat the competition.
    Starting Price: $2,199 per year
  • 10
    Aruba.it

    Aruba.it

    Aruba.it

    Aruba, founded in 1994, is the leading company in Italy for data centers, web hosting, email, certified email (PEC) and domain registration services. Our enterprise solutions, integrated technology and the expertise of our teams of professionals mean that we can design the best solutions to meet the challenges of our clients, guaranteeing efficiency, readiness to escalation and a focus on resolving issues quickly. Aruba manages 2.7 million domains, 8.6 million email accounts, 8 million certified email (PEC) accounts, 130,000 physical and virtual servers and a total of around 5.4 million customers. We provide hosting services, public and private cloud services, housing and colocation services, dedicated servers, digital signature services, fiber optic internet, digital preservation, e-billing, certified email, SSL certificates and smart-cards. For more than 10 years, Aruba Enterprise has been dedicated to planning, implementing and managing technological solutions.
    Starting Price: €0.99 per month
  • 11
    Bocada

    Bocada

    Bocada

    Bocada offers a single dashboard for automated backup operations oversight, asset protection, and compliance reporting. Backup Monitoring: Track past and current backup performance trends with built-in, highly configurable reports. Save preconfigured report templates, schedule them to run at your desired cadence, and automatically distribute them to key stakeholders. Compliance Oversight: Create backup audit reports for any period, geography, server group, or backup product in minutes.. Enjoy a wholly independent solution to show auditors that you meet key data protection metrics. Asset Protection: Safeguard valuable resources across your IT environment with automated unprotected asset discovery, failure alerting, and unusual backup behavior detection. Stay one step ahead of issues impacting data restorability. Workflow Automation: Remove tedious, manual touch points out of your remediation workflows with automated failure ticketing and built-in issue identification.
  • 12
    Netwrix Password Policy Enforcer
    Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware. Unfortunately, native Windows tools often cannot deliver the detailed configurations and rules required for modern password policies, leaving IT teams struggling to keep up with the changing threat landscape and evolving compliance requirements. Meanwhile, user productivity suffers and IT helpdesks are swamped as users grapple with unclear requirements for new passwords. Learn how Netwrix Password Policy Enforcer can help you achieve truly effective password enforcement without all the hassles.
  • 13
    Link

    Link

    Link

    Find the perfect available domain name or transfer your domain to one of our hosting plans. We offer plans to suit everyone from the small business owner to operators of multiple websites with high-volume traffic. Everything you need to create the perfect website. Choose a website design template, or your very own design. If you already have a website, you can easily transfer it to one of our hosting plans. We are with you every step of the way. Find or transfer your domain name, build your site, and make it a success. Bare Metal servers provide performance, flexibility, on-demand provisioning, and control. Link is an easy-to use virtual private server (VPS) that offers you everything needed to quickly deploy and start business. Flash backed local disk performance with persistence and durability. Give your website an added layer of security and credibility with an SSL certificate. give your business a truly professional look with a personalized email.
    Starting Price: $2.99 per month
  • 14
    Stor2RRD
    Analyze key infrastructure performance metrics of your storage, SAN, and LAN devices. Optimize your mission-critical IT infrastructure. It provides a complete mapping overview through cloud, container, server virtualization, and database. Leading performance-monitoring solution thanks to unique web-based UI for graphical interpretation of performance utilization in a virtualized environment. You can find utilization of any attached storage in a simple graphical form comprehensible to anyone from technician to management level. Bring an easy solution to the market to improve the capacity planning of your highly virtualized environment with a simple and easily comprehensible UI. Stor2RRD provides performance, capacity, configuration, and status. Simply and quickly identify load abnormalities and locate problems at the infrastructure level.
  • 15
    MAKVES DCAP
    MAKVES DCAP is a comprehensive data-centric audit and protection solution designed to safeguard corporate information by controlling access to critical data, and ensuring compliance with regulations like GDPR, FZ-152, and PCI DSS. This system helps businesses by monitoring user access to files, tracking sensitive information, and identifying risks such as excessive access rights and unauthorized activity. MAKVES DCAP offers a centralized platform for auditing IT assets across various environments, including Active Directory, cloud storage, email servers, and more. It also automates data classification, behavioral analysis, and policy enforcement to prevent data breaches. With a focus on protecting unstructured data, the solution provides real-time recommendations and remediation tools directly in the system interface. Forms a transparent matrix of access to company information resources.
  • 16
    IBM Apptio
    IBM Apptio unifies financial and operational data into a unified model built on the industry-standard taxonomy of cost categorization. Utilizing sophisticated allocation rules along with focused metrics and KPIs, we enable organizations to answer the most strategic questions about investments and accelerate budgeting and forecasting processes. By explaining investments and variance to plan more quickly to constituencies and executive management, organizations can uncover opportunities to optimize cost structures, reduce risk, and accelerate growth. Implement a structured view of IT expenses for actuals and plans based on industry-standard framework to allow for faster ad hoc analysis and budgeting cycles. Lower overall IT spend by reducing waste, eliminating duplications, and aligning investments to strategic priorities. Reduce the time spent forecasting, accelerate frequency, and redirect resources to higher-value activities.
  • 17
    ParkView Hardware Monitoring

    ParkView Hardware Monitoring

    Parkplace Technologies

    ParkView Hardware Monitoring™ is a hosted service that boosts Uptime by proactively monitoring data center storage, server and networking hardware 24/7. ParkView™​ develops baselines, specific to your environment, that help filter out noise, resulting in alerts being sent only for actionable events. ParkView™​ can even predict some events before they occur. When remediation is needed, ParkView™​ automatically opens incident tickets and triages the issue. Then, Park Place engineers are dispatched immediately to your data center, making the service experience as efficient as possible. ParkView Hardware Monitoring™ proactively identifies faults 24/7 without the need for customer action of any kind. ParkView Hardware Monitoring™ supports all storage, server and networking equipment and all OEM vendors currently supported by Park Place Technologies. We set up security features based on each customer’s individual security requirements.
  • 18
    Dell EMC XC Family
    XC Family solutions consist of XC Series appliances, XC Core nodes, integrated Nutanix software, and Dell EMC PowerEdge servers with Intel Xeon processors to offer one of the industry’s most versatile and scalable HCI platforms. With factory-installed Nutanix software and a choice of hypervisors, XC Family systems can be deployed quickly for all virtualized workloads to reduce management complexity and total cost of ownership. Dell EMC has over 12 years of experience integrating hardware and software for appliances built with PowerEdge servers, including 3 generations of XC Family appliances and systems. That experience enables us to develop technologies that simplify and streamline common workflows performed throughout the product’s lifecycle. Factory installation of the software stack and hypervisor. Software modules that deliver fast and seamless deployment. Tools developed specifically for HCI to simplify workflow orchestration across a cluster.
  • 19
    iFinder

    iFinder

    IntraFind Software

    IntraFind's Enterprise Search solution iFinder is a central search platform for all of your company's data. iFinder can be connected to all of the data sources within your company. Are your data pools constantly growing? With iFinder you are well equipped for the future: our product is based on Elasticsearch technology and can therefore adapt to any volume of data with ease. It also improves search results by deploying artificial intelligence to deliver smart enterprise search functionality. iFinder helps you find important data and documents, whether they are located on a company drive, on the intranet, in wikis, or in e-mail systems. Take the next step in your company’s digital transformation by centralizing access to all company data with our enterprise search application. iFinder improves search results by deploying artificial intelligence to deliver smart enterprise search functionality.
  • 20
    SUSE Linux Micro
    SUSE Linux Micro is a lightweight, container-optimized Linux operating system designed for edge computing and microservices environments. It offers a small footprint with security and performance optimized for deploying containerized applications. The platform enables fast, scalable, and cost-efficient cloud-native development, especially in resource-constrained environments. With built-in automation tools and compatibility with Kubernetes, SUSE Linux Micro supports seamless integration into modern containerized infrastructures. It is ideal for developers and IT operations teams who need to deploy and manage applications across distributed environments efficiently.
  • 21
    Cisco Kinetic
    Get business value from your IoT data and meet challenges in IoT environments where devices and applications are highly distributed. Count on the Cisco Kinetic to help securely connect your devices. Add compute power anywhere in the network, from edge to cloud. And selectively move data to applications to drive better business outcomes. Cisco Kinetic includes two modules that work together to help you securely connect devices, and then extract, compute and move your IoT data. Compute data in distributed nodes. Make critical decisions near the point of action, and make the most efficient use of network resources. Move the right data from diverse connected devices to the right cloud-based applications, at the right time, according to policy set by the data owner. Improve business outcomes with our end-to-end IoT portfolio. Securely connect assets, applications, and data in real-time to apply transformative business changes in both carpeted and non-carpeted spaces.
  • 22
    windream

    windream

    windream

    As one of Europe's leading System provider of digital document management and business process modelling, we have created a powerful software suite with windream which sets completely new standards! With our software system, you manage all your documents such as e-mails, contracts, invoices, files and other information purely digitally and absolutely legally compliant. No matter what kind of documents you manage and no matter where you work and which device you use, with windream, you always have your digital workplace with you. Whether in the home office, on the road or in the office, there are no limits to the availability of your documents. Creating, managing, archiving and searching for documents, all of these processes can no longer be done adequately on paper in the age of digital transformation. Instead, modern and powerful IT solutions support you in performing all your "document jobs" in a purely electronic way.
  • 23
    PangaeAPI

    PangaeAPI

    SOFTwarfare

    PangaeAPI™ is a purpose-built integration platform as a service (IPaaS) that secures, manages, and monitors mission-critical integrations. By establishing a standardized integration methodology, PangaeAPI improves operational outcomes, limits attack surfaces, and reduces costs associated with API maintenance, security, and compatibility. With PangaeAPI, your team can easily connect and integrate your various security tools in order to seamlessly share data, replacing cumbersome, time-consuming manual processes for these integrations. In addition to the tangible savings of cost and time, implementing our PangaeAPI platform improves security response time and allows your team to complete more security tasks. More than ever, companies need to find the best possible way to maintain, secure and monitor mission-critical operations to ensure that sensitive data and applications are safeguarded from outside attacks. With PangaeAPI, we take the tedious legwork out of this process.
  • 24
    Otava

    Otava

    Otava

    Otava Gen3 Cloud makes cloud computing incredibly easy. Leveraging VMware Cloud Director, you can quickly add and configure resources in your environment and dream big. Consumption-based billing allows for full transparency of usage and volume at the detailed level. Which means you have easy access to the full set of interoperable VMware Cloud Infrastructure capabilities delivered as a service. It’s just another way Otava makes your cloud experience O’ so easy! Our passion for excellence fuels us to explore new solutions and bring them to life with our partners and clients. Through innovation and collaboration, we overcome every regulatory and security challenge and execute with fierce dedication. You can count on us to do what we say we’re going to do, because we won’t let anything stand in our way. Secure, compliant hybrid cloud computing for service providers, channel partners and enterprise clients.
  • 25
    Pulsant

    Pulsant

    Pulsant

    Connect to your potential through our network of edge data centers, delivering high-speed, low latency coverage to 95% of the UK population. Our high-bandwidth low-latency network gives you fast connectivity and low transit costs through our 10 regional data centers on your doorstep. With over 25 years’ experience, we will help you build the right IT infrastructure to accelerate your growth, while ensuring your business-critical applications remain secure, compliant and resilient. There’s no one-size-fits-all approach to digital transformation. Connect to our reliable, secure and scalable national network of data centers and cloud platforms to help you transform at your own pace. Great cloud needs a Great network. Connect to the data you need faster than any other provider in the UK with security to match. Cloud tailored to your needs. We work with you to run your workloads in the right cloud environments across hybrid and multi-cloud.
  • 26
    AriLinc

    AriLinc

    Infintrix Global

    AriLinc is an industrial IoT gateway that converts various PLC Modbus RTU and Modbus TCP into Modbus TCP, OPC UA, MQTT, AWS, and other protocols. AriLinc adopts an embedded Linux system, supports TSL, SSL encryption, provides 1 RS232/RS485 optional serial input, 1 power output, 2 Ethernet ports and 2 USB ports, and supports SIM card and SD card. The built-in 4G network or Ethernet access to the Internet has the characteristics of fast speed and low latency. The Lora Gateway S281 series are special for data acquisition via Lora technology, supports wireless sensors and a wireless RS485 serial data converter. It is widely used in agricultural greenhouses, chemical plant, electroplating plant, hospital sites and storage warehouses for real-time temperature and humidity collection/monitoring. We offer comprehensive IT solutions, customized software development, mobile application & web development along with offshore IT consultancy services.
  • 27
    Pavilion HyperOS
    Powering the most performant, dense, scalable, and flexible storage platform in the universe. Pavilion HyperParallel File System™ provides the ability to scale across an unlimited number of Pavilion HyperParallel Flash Arrays™, providing 1.2 TB/s read, and 900 GB/s write bandwidth with 200M IOPS at 25µs latency per rack. Uniquely capable of providing independent, linear scalability of both capacity and performance, the Pavilion HyperOS 3 now provides global namespace support for both NFS and S3, enabling unlimited, linear scale across an unlimited number of Pavilion HyperParallel Flash Array systems. Take advantage of the power of the Pavilion HyperParallel Flash Array to enjoy unrivaled levels of performance and availability. The Pavilion HyperOS includes patent-pending technology to ensure that your data is always available, with performant access that legacy arrays cannot match.
  • 28
    MBX Hatch

    MBX Hatch

    MBX Systems

    Hatch software revolutionizes hardware execution by transforming how hardware teams work. Purpose-built for the complexities of hardware management, Hatch blends disparate operational roles into a collaborative team, providing the tools and transparency to plan, manage, deploy, and support hardware solutions for improved execution, all within a single platform. Configurable products mean choices without challenges. Easily customize product configurations for each customer using a single BOM containing pre-defined component groupings for thousands of potential hardware permutations you can choose at the push of a button. Oversee engineering changes in a traceable repository. Every description, due date, status, review, and approval is consolidated in one spot. Say goodbye to archaic spreadsheets, errant emails, and extraneous applications. Tracking work in process in real-time down to the work center allows you to accurately update customers for orders in process.
  • 29
    Virtalica StorageFabric
    Enterprises often find it challenging to keep up with the rapid proliferation and availability of various on-premise and cloud storage solutions across the organization. The result is an increasingly complex, difficult to secure, and often expensive vendor-locked ecosystem. Dozens of legacy systems are patched together. Vendor lock-in comes with significant hidden costs. Consuming public cloud efficiently and securely is not easy. It is a customer-hosted global scale-out software platform that enables enterprises to integrate, protect and unify tens of on-prem and in-cloud storage providers. It seamlessly offers unified virtual namespaces through standard APIs to enterprise users worldwide. StorageFabric frees the enterprise from expensive vendor lock-in and integration complexity while handling the significant security vulnerabilities that come with the cloud. StorageFabric is the highest-performance least-friction data layer to unify, protect, migrate, and commoditize storage.
  • 30
    Affirmed Cloud Edge
    The Affirmed Cloud Edge (ACE) solution for mobile edge computing (MEC) offers Communication Service Providers (CSPs) and Enterprises the ability to host applications and keep data local on the customers’ premises to minimize latency and maximize efficiency. Affirmed’s MEC solution can be deployed and utilized at the edge of the mobile operator’s network or used as part of the Cloud Edge offerings from AWS, Microsoft Azure, or Google Cloud. Mobile edge computing allows telecom operators to create high-value use cases for businesses and consumers. Fast air interface and rapid session establishment for new low latency services such as immersive in-stadium experiences. Optimize content for the delivery method and user conditions in time and space. Efficient bandwidth and compute use for optimized IoT analytic applications and content caching. Fast air interface and rapid session establishment. Use for localized high bandwidth applications such as AR/VR entertainment.
  • 31
    Pica8 AmpCon
    Enterprise campus, distributed sites, and data center networks are replacing thousands of Cisco Catalyst switches with PicOS Software Switches on hardware provided by Dell and Edgecore. Through a single GUI, Pica8’s AmpCon™ Network Controller centrally manages and automates switch deployments as an alternative to Cisco DNA Center. Customers secure an increase in freedom and reduction in expense that every C-level executive will appreciate. Pica8’s AmpCon is a network controller that manages the lifecycle of any number of open network switches in enterprise campus and branch/retail office access networks. AmpCon comprises a set of server-based tools that enable enterprises to remotely install, configure and provision hundreds, or thousands, of PicOS Software, Switches deployed on white box switch hardware. It is the first network controller that leverages both advanced proprietary and open technology allowing network operators to run their networking software with full visibility.
  • 32
    Open Container Initiative (OCI)

    Open Container Initiative (OCI)

    Open Container Initiative (OCI)

    The Open Container Initiative is an open governance structure for the express purpose of creating open industry standards around container formats and runtimes. Established in June 2015 by Docker and other leaders in the container industry, the OCI currently contains two specifications, the runtime specification (runtime-spec) and the image specification (image-spec). The runtime specification outlines how to run a “filesystem bundle” that is unpacked on disk. At a high-level an OCI implementation would download an OCI Image then unpack that image into an OCI Runtime filesystem bundle. At this point the OCI Runtime Bundle would be run by an OCI Runtime. The Open Container Initiative (OCI) is a lightweight, open governance structure (project), formed under the auspices of the Linux Foundation, for the express purpose of creating open industry standards around container formats and runtime. The OCI was launched on June 22nd 2015 by Docker, CoreOS and other leaders.
  • 33
    MindSafe

    MindSafe

    Atlantix Global

    When it’s time to retire your IT hardware there’s an entirely new risk to your data. Don’t overlook this critically important step in any IT project. We safeguard your data with our leading-edge erasure and destruction services that meet the most rigorous industry standards. Atlantix employs the industry’s largest team of technical engineers to handle your data security needs. With expertise across all major platforms and manufacturers (Dell EMC, NetApp, HPE, IBM, Cisco, and more), we deploy a compliant sanitization protocol without degrading the value of your IT assets. Atlantix evaluates your assets and determines the best course of action, data erasure, degaussing or shredding. Our process includes a full audit and tracking through serial number capturing to ensure your products are secure. MindSafe erasure services are performed when your products are in good condition and considered as equipment for reuse, redeployment, or remarketing.
  • 34
    Azure Marketplace
    Azure Marketplace is a comprehensive online store that provides access to thousands of certified, ready-to-use software applications, services, and solutions from Microsoft and third-party vendors. It enables businesses to discover, purchase, and deploy software directly within the Azure cloud environment. The marketplace offers a wide range of products, including virtual machine images, AI and machine learning models, developer tools, security solutions, and industry-specific applications. With flexible pricing options like pay-as-you-go, free trials, and subscription models, Azure Marketplace simplifies the procurement process and centralizes billing through a single Azure invoice. It supports seamless integration with Azure services, enabling organizations to enhance their cloud infrastructure, streamline workflows, and accelerate digital transformation initiatives.
  • 35
    CloudCover CoverIT
    CoverIT is a modular, API‑driven IT lifecycle management platform designed to integrate seamlessly with your existing software and vendor portals. It offers three core applications; ContractHub for centralized tracking of OEM and TPM contracts and assets with automated renewal reminders; ServiceHub for real‑time ticket management, live messaging updates, and end‑to‑end work order workflows; and QuoteHub for faster, more accurate quote generation, with optional white‑labeling to extend your brand across all interfaces. All modules share enterprise‑grade features including single sign‑on, user customization, multi‑tenancy, cross‑application integration, standalone deployment, and comprehensive REST APIs. CoverIT eliminates spreadsheet chaos by providing a single pane of glass view into contract lifecycles, ticket SLAs, and quoting status while enabling custom asset detail tracking, sourcing resource allocation, and secure OEM Smart Net status reconciliation.
  • 36
    iTalent

    iTalent

    Business DNA

    iTalent is an 360 degree HR & Talent management suite which covers all the processes from Employee onboarding till Exit interview. This software is built in line with the international HR standards for Talent and Human Management approach so it will fit in any existing HR ERP legacy system with minimal customization and integration effort.iTalent integrates the dissected functions of HR Management and brings them together to deliver a value to its stakeholders moving from looking at employees as “a resource” to another era as “a talent”. A module that also helps in Auto-application tracking. A software that helps manage leave application, documents, passport validity etc. as well. It covers career planning, talent acquisition & performance management as well. A software that empowers you with career growth & planning tools. Application Tracking System with CV Parsing auto-bots. A 360 degree Talent Management Software. Workflow management system.
  • 37
    DDP Endpoint Security Suite
    Dell Data Protection | Endpoint Security Suite offers threat protection, authentication, and encryption, all centrally-managed from the Dell Data Protection Server. With centralized management, consolidated compliance reporting, and console threat alerts, businesses can easily enforce and prove compliance for all of their endpoints. Ensure that security device drivers are up-to-date for the best customer experience. Visit http://www.dell.com/support to download Dell ControlVault drivers. Software-based Data Centric Encryption enables IT to easily enforce encryption policies, whether the data resides on the system drive or external media. Designed for mixed vendor environments, it also won’t get in the way of existing IT processes for patch management and authentication. Exclusive to select Dell Latitude, OptiPlex and Dell Precision systems, the optional Full Volume Encryption* solution equips end-user systems with military-grade protection that won’t slow your employees down.
  • 38
    DDP Mobile Edition
    Today employees, partners and vendors alike work any time, anywhere, using any device to download and share files. Personally owned smartphones and tablets, like desktops and laptops, have become a standard work tool. Accordingly, most organizations are embracing the bring your own device movement, recognizing it helps to both reduce equipment costs and increase productivity. But without proper encryption and password enforcement, data accessed on mobile devices, whether from a corporate server or a public cloud, is unprotected. If the device is lost or stolen, or if data is accessed through an open wireless hotspot, it could be hijacked, putting companies in jeopardy of a security breach and compliance violations. IT teams are struggling to strike a balance between protecting data and impeding worker productivity by restricting data access. Dell Data Protection | Mobile Edition helps to put IT back in control of data security by enabling you to protect data.
  • 39
    HyTrust

    HyTrust

    HyTrust

    In a multi-cloud world where technology moves at lightning speed and security often plays catchup, organizations face the daunting challenge of eliminating the gaps and resolving the inconsistencies in policy enforcement and adherence to compliance mandates. HyTrust CloudControl provides advanced privileged user access control, policy enforcement, forensic and automated compliance for private clouds. HyTrust DataControl provides powerful data-at-rest encryption and integrated key management for workloads running in any cloud environment. Encrypting workloads helps enterprises to ensure their data is protected. One of the challenges of workload encryption is scaling the management of encryption keys. HyTrust’s mission is to make private, public and hybrid cloud infrastructure more trustworthy for enterprises, service providers and government agencies. HyTrust provides solutions that automate security controls for software-defined computing, networking and storage workloads.
  • 40
    CYA SmartRecovery
    Documentum® allows you to deploy robust, agile business applications that manage, control and automate critical business processes across various departments. However, the amount of information stored in your Documentum repository grows continuously and its not uncommon to have repositories in the terabyte size range - with petabyte-sized repositories just around the corner! Without the right solution, protecting this critical data from all potential threats can be a Herculean task. Not to mention backing up these massive repositories can result in unacceptable Documentum downtime and high storage costs. Protect your Documentum investment with CYA SmartRecovery™, an application-aware solution that enables rapid and full recovery from operational incidents such as corruptions, power surges, and programmatic errors. CYA Smart Recovery enables one, several, or thousands of objects to be quickly restored to the repository by a single administrator — all while Documentum stays online.
  • 41
    Cognixia

    Cognixia

    Cognixia

    Cognixia offers over 250 online programs designed specifically to help companies and their employees close the digital skills gap. Our learning programs on digital innovation, and we have a deep understanding of the most critical competencies required for people and organizations to stay ahead of the curve. Programs are both guided and self-guided depending on the curriculum, and cover various level of programs across all relevant technologies. Cognixia is a digital transformation partner with a focus on future-proofing the modern workforce. Whether it’s upgrading your workforce in tomorrow’s technologies, delivering digital-ready talent to hire, or building a digital transformation roadmap for your business, Cognixia can help you get ahead of the technology curve. Cognixia will guide you through your digital transformation and beyond. Since 2014, over 130,000 people across 45 countries have been trained in digital technologies by Cognixia’s team.
  • 42
    Cisco Prime Network
    Cisco Prime Network is a cost-effective device operation, administration, and network fault-management solution. This single solution helps service providers reduce management complexity and deliver carrier-class services. It supports the physical network components as well as the compute infrastructure, and virtual elements found in data centers. Increased operational efficiency through automated network discovery, configuration and change management. Enhanced customer satisfaction through proactive service assurance using postevent fault management and trend information. Lower integration costs through preintegration with Cisco Prime Carrier Management suite and northbound interfaces to third party applications. Detailed end-to-end views of the physical and virtual network topology and inventory. GUI-based device configuration with prebuilt and downloadable scripts. Up-to-date displays of network event, state, and configuration changes.
  • 43
    CyberSense

    CyberSense

    INDEX ENGINES

    Cyberattacks will occur, even with the most advanced security applications in place. Organizations need to be smarter. Smart enough to know when their core infrastructure, user data and key production databases are corrupted due to ransomware. CyberSense® monitors backup data to understand how data changes over time including changes that are indicative of a cyberattack. As a last line of defense, CyberSense will then alert when data is corrupted allowing for an intelligent recovery plan. At the heart of CyberSense is a full-content-analytics engine that inspects inside files and databases for even the most sophisticated attacks. No other solution can compare and provide the confidence that data has integrity. Machine learning is then utilized with 99.5% accuracy to determine if the data corruption is due to malware. If an attack is suspected, CyberSense will deliver an alert, and provide post-attack diagnostics to determine when the attack occurred.
  • 44
    Casa Systems

    Casa Systems

    Casa Systems

    5G technology enables network customization like never before, providing a unique opportunity to build and control the network experience end to end. Private networks, locally hosted or via the cloud, offer a path to data ownership, high levels of security, application customization, and differentiated performance using a variety of radio technologies. As 5G expands, all signs point to a new era of private and hybrid public/private networks. The move is already underway among a growing number of organizations eager to improve security, availability, and reliability. Process sensitive data on-site or securely in the cloud. Prioritize levels of security by application or location. Process data locally, and immediately, to reduce lag and minimize latency for near-real-time functions like computer vision and quality control. Flexibly set quality of service (QoS), compliance, and user experience parameters across the network.
  • Previous
  • You're on page 1
  • Next