19 Integrations with IBM AIX

View a list of IBM AIX integrations and software that integrates with IBM AIX below. Compare the best IBM AIX integrations as well as features, ratings, user reviews, and pricing of software that integrates with IBM AIX. Here are the current IBM AIX integrations in 2026:

  • 1
    C2CRM

    C2CRM

    Clear C2

    At Clear C2, we understand that different companies have different business requirements. We designed C2CRM to allow you to choose only the functions you need. Our CRM system is a cost-effective solution that will grow with your business. C2CRM consists of four modules that integrate to provide a comprehensive CRM solution: Relationship Management, Sales Automation, Marketing Automation, and Customer Service. Only buy what each user needs. The C2CRM Relationship Management module is the core of our solution. It consists of all the logic you need to manage your business relationships effectively and a mobile app to keep your sales team informed while on the road. Get a 360-degree view of your accounts, contacts, and activity with built-in dashboards, workflow automation, and reports.
    Starting Price: $37 per user per month
  • 2
    Netdata

    Netdata

    Netdata, Inc.

    The open-source observability platform everyone needs! Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: đŸ’„ Collects metrics from 800+ integrations đŸ’Ș Real-Time, Low-Latency, High-Resolution đŸ˜¶â€đŸŒ«ïž Unsupervised Anomaly Detection đŸ”„ Powerful Visualization 🔔 Out of box Alerts 📖 systemd Journal Logs Explorer 😎 Low Maintenance ⭐ Open and Extensible Try Netdata today and feel the pulse of your infrastructure, with high-resolution metrics, journal logs and real-time visualizations.
    Leader badge
    Starting Price: Free
  • 3
    IRI CoSort

    IRI CoSort

    IRI, The CoSort Company

    What is CoSort? IRI CoSort¼ is a fast, affordable, and easy-to-use sort/merge/report utility, and a full-featured data transformation and preparation package. The world's first sort product off the mainframe, CoSort continues to deliver maximum price-performance and functional versatility for the manipulation and blending of big data sources. CoSort also powers the IRI Voracity data management platform and many third-party tools. What does CoSort do? CoSort runs multi-threaded sort/merge jobs AND many other high-volume (big data) manipulations separately, or in combination. It can also cleanse, mask, convert, and report at the same time. Self-documenting 4GL scripts supported in Eclipseℱ help you speed or leave legacy: sort, ETL and BI tools; COBOL and SQL programs, plus Hadoop, Perl, Python, and other batch jobs. Use CoSort to sort, join, aggregate, and load 2-20X faster than data wrangling and BI tools, 10x faster than SQL transforms, and 6x faster than most ETL tools.
    Starting Price: $4,000 perpetual use
  • 4
    IRI FieldShield

    IRI FieldShield

    IRI, The CoSort Company

    IRI FieldShieldÂź is powerful and affordable data discovery and masking software for PII in structured and semi-structured sources, big and small. Use FieldShield utilities in Eclipse to profile, search and mask data at rest (static data masking), and the FieldShield SDK to mask (or unmask) data in motion (dynamic data masking). Classify PII centrally, find it globally, and mask it consistently. Preserve realism and referential integrity via encryption, pseudonymization, redaction, and other rules for production and test environments. Delete, deliver, or anonymize data subject to DPA, FERPA, GDPR, GLBA, HIPAA, PCI, POPI, SOX, etc. Verify compliance via human- and machine-readable search reports, job audit logs, and re-identification risk scores. Optionally mask data as you map it. Apply FieldShield functions in IRI Voracity ETL, federation, migration, replication, subsetting, or analytic jobs. Or, run FieldShield from Actifio, Commvault or Windocks to mask DB clones.
  • 5
    SD Elements

    SD Elements

    Security Compass

    SD Elements (SDE) helps AppSec teams keep up with rising development demands by defining the exact security requirements a project needs early, often cutting review time by 30–50%. As a Security by Design platform, it identifies risks during planning and architecture—when fixes are fastest—and turns them into clear, standards-mapped requirements developers can use. SDE evaluates architecture, data sensitivity, and regulatory needs to generate the right controls with concise implementation guidance. This allows small AppSec teams to support security across 100+ applications without adding headcount while ensuring consistent, standardized requirements across teams and products. The platform integrates with Jira, CI/CD pipelines, and other dev tools so security tasks align with delivery workflows. Directors gain visibility into requirement coverage, security posture, and audit readiness, making it easier to reduce risk, track progress, and report to leadership.
  • 6
    RadiantOne

    RadiantOne

    Radiant Logic

    Make identity a business enabler with a unified platform that transforms your existing infrastructure into a resource for the entire organization. RadiantOne is the cornerstone of complex identity infrastructures. Harness your identity data with intelligent integration to drive better business outcomes, improve security and compliance posture, increase speed-to-market, and more. Without RadiantOne, companies must rely on custom coding, rework, and ongoing maintenance to make new initiatives work with existing environments. Expensive solutions can’t be deployed on time or on budget, negatively impacting ROI and causing employee frustration. Identity frameworks that can’t scale waste time and resources, with employees struggling to deploy new solutions for users. Rigid, static systems can’t meet changing requirements, leading to duplicate efforts and repeated processes.
  • 7
    Melissa Data Quality Suite
    Up to 20 percent of a company’s contacts contain bad data according to industry experts; resulting in returned mail, address correction fees, bounced emails, and wasted sales and marketing efforts. Use the Data Quality Suite to standardize, verify and correct all your contact data, postal address, email address, phone number, and name for effective communications and efficient business operations. Verify, standardize, & transliterate addresses for over 240 countries. Use intelligent recognition to identify 650,000+ ethnically-diverse first & last names. Authenticate phone numbers, and geo-data & ensure mobile numbers are live & callable. Validate domain, syntax, spelling, & even test SMTP for global email verification. The Data Quality Suite helps organizations of all sizes verify and maintain data so they can effectively communicate with their customers via postal mail, email, or phone.
  • 8
    EV Observe

    EV Observe

    EasyVista

    Increasing service and support efficiency and business satisfaction starts with predicting and avoiding downtime. EV Observe is a monitoring platform for network, IoT, IT infrastructure, cloud, and application monitoring that delivers an end-to-end service experience. We make it easy for organizations to embrace a proactive and predictive approach to service support, delivery, and observability, including collaborative self-help, self-healing, and comprehensive performance and availability insights. This helps teams to focus on value delivery and innovation that drives business outcomes, resulting in higher employee engagement and a better customer experience, increased productivity, and improved resiliency. Designed for SaaS monitoring in a multi-client, multi-site context for the cloud. Integrated software production tool covering the entire spectrum of software processes, and has instituted DevOps practices.
  • 9
    IntelliMagic for SAN
    Monitor the performance, capacity & configuration of your multi-vendor SAN infrastructure in a single view. Reduce your costs and mean time to resolution, and safely get the most value out of your SAN infrastructure with built-in architecture-specific intelligence and statistical anomaly detection. IntelliMagic Vision for SAN provides a single pane of glass for monitoring the health and performance of your entire SAN/NAS infrastructure. IntelliMagic Vision’s built-in artificial intelligence proactively detects issues and potential bottlenecks developing inside your storage arrays that could cause delays in application performance and hurt your business if left undetected and vastly reduces mean time to resolution for issues. Automated health insights leverage hardware-specific AIOps functions to identify and prevent the most common storage and fabric performance and capacity issues. Health Insights include time, multiple metrics, multiple components, and AI-rated metrics.
  • 10
    NXLog

    NXLog

    NXLog

    Achieve complete security observability with powerful insights from your log data. Improve your infrastructure visibility and enhance threat prevention with a versatile multi-platform tool. With support for over 100 operating system versions and more than 120 configurable modules, gain comprehensive insights and increased security. Cut the cost of your SIEM solution by reducing noisy and unnecessary log data. Filter events, truncate unused fields, and remove duplicates to increase the quality of your logs. Collect and aggregate logs from systems across the entire breadth of your organization with a single tool. Reduce complexity in managing security-related events and decrease detection and response times. Empower your organization to meet compliance requirements by centralizing some logs in an SIEM and archiving others in your long-term storage. NXLog Platform is an on-premises solution for centralized log management, with versatile processing.
  • 11
    Uptempo

    Uptempo

    Uptempo

    Markets change. Pivot your marketing plan faster. Uptempo helps you plan, spend and execute with agility. Uptempo’s enterprise marketing operations suite helps teams move with unprecedented speed and change direction when market conditions dictate. Uptempo is the leading SaaS provider of effective and scalable marketing ops management solutions. The company delivers the visibility, control, and agility that enterprise marketers require to optimize their marketing operations. Uptempo tames the complexity of multinational marketing campaigns, budgets, and team workflows, enabling companies to work across borders, cultures, and silos for efficiency and value. Independent research firms recognize Uptempo as a leader in marketing ops. Uptempo is the combination of BrandMaker, Allocadia, and Hive9—driven by a bold vision to help marketers lead with confidence and love their jobs.
  • 12
    IBM Cloud for Skytap Solutions
    You're migrating to cloud, but your traditional infrastructure blocks progress. The Skytap on IBM Cloud¼ service is the only public cloud service that supports traditional x86 and IBM¼ AIX¼, IBM System iℱ and Linux¼ on IBM Power¼ applications running together in the same environment. Integrate with cloud-native services with no vendor lock-in. Make the most of your System i, AIX and Linux applications. Integrate with cloud-native services and move to the cloud without rewriting or refactoring. (link resides outside IBM). App modernization and multicloud adoption can deliver significant benefits to your organization. Use a cost-effective method as you modernize. Traditionally, migration is impossible without significant rework. With Skytap on IBM Cloud, you can migrate your traditional application without change. Migrate to cloud with a service for traditional x86 and IBM Power Systems applications.
  • 13
    AD Bridge

    AD Bridge

    BeyondTrust

    Extend Microsoft¼ Active Directory authentication, single sign-on capabilities, and group policy configuration management to Unix & Linux systems with AD Bridge. Consistent tools across the enterprise. Provide a single familiar toolset to manage both Windows and Unix/Linux systems. Streamline compliance processes. Provide thorough audit details to audit and compliance teams and manage group policies centrally. Extend security policies. Expand single sign-on (SSO) and file sharing, and control access to non-Windows systems. BeyondTrust AD Bridge centralizes authentication for Unix and Linux environments by extending Active Directory’s Kerberos authentication and single sign-on capabilities to these platforms. By extending group policy to non-Windows platforms, BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment. Extend native group policy management tools to include settings for Unix and Linux.
  • 14
    TABEX4

    TABEX4

    BOI Software

    TABEX4 runs on all common operating systems and is applicable throughout the company – both on mainframe and server systems. Tables can be maintained efficiently and safely, independent of platform or database. TABEX4 supports import of table data from other software products and memory forms through optimized APIs. Export is possible in diverse ways as well: e.g. pdf, e-mail and other data or store formats. Our TABEX4 FAQs offer you a profound overview of important TABEX4 topics. In the TABEX4 Wiki you will gain expert knowledge about technical questions and challenges. Master public audits smoothly: TABEX4 places absolute priority to transparency and security in processing master data and control data. The TABEX4 Relational Bridge extends TABEX4 by interfaces to relational databases and makes the entire TABEX4 functions available for RDBs.
  • 15
    DocOrigin

    DocOrigin

    Eclipse Corporation

    DocOrigin is the solution for generating professional, dynamic, high-fidelity business documents. Whether you need to produce large volumes of invoices or statements, or a single customer letter, DocOrigin can handle your requirements quickly, easily, and affordably. You can leverage the data stored in legacy, Enterprise Resource Planning (ERP), Customer Relationship Management (CRM), and other line-of-business applications to provide customers, suppliers, and employees with documents that contain the right information, in the preferred output formats, delivered to the desired devices. Integrates easily with existing legacy applications and processes. Dynamic HTML documents for both presentation and data collection. Repurpose unused space in transactional documents for custom content. Generate a single document on demand or continuous batch generation. Intuitive template creation with DocOrigin Design.
  • 16
    OTTera

    OTTera

    OTTera

    OTTera is a professional white label service that allows companies to quickly launch customized, cost effective OTT applications and FAST channels. Based in Los Angeles but having team members around the world, OTTera powers 600+ live applications and has delivered 2,000+ FAST channels to platforms globally. Our white label offering allows companies the widest distribution available, being deployed across all device types & operating systems, with control over their own environment, letting them bring an experience they know users will love in a 30 day timeframe. OTT Applications & FAST Channels Empower your brand to connect directly with your audience through a tailored digital strategy, incorporating streaming application and FAST channel development, to drive a personalized and engaging viewing experience. AdNet+ℱ AdNet+ provides direct and programmatic advertising as part of a fully managed monetization service.
  • 17
    IBM PowerVC
    IBM PowerVC is an OpenStack-based virtualization management solution designed to simplify the deployment and management of virtual machines across IBM Power Systems running AIX, IBM i, and Linux. It offers rapid deployment capabilities, reducing time-to-value through straightforward installation and configuration processes. The intuitive user interface minimizes the need for specialized training, enhancing administrator productivity. PowerVC facilitates efficient resource utilization by enabling resource pooling and implementing placement policies, thereby optimizing IT costs. The Dynamic Resource Optimizer (DRO) provides policy-based automation for active workload balancing within host groups, ensuring optimal performance. VM templates support consistency and standardization, streamlining deployments and reducing labor costs. Key features include automated I/O configuration for mobility and high availability, and seamless import and deployment of workload images.
  • 18
    OpenText Server Backup
    OpenText Server Backup gives your business a secure, all-in-one solution for protecting physical, virtual, and legacy systems with flexible local, cloud, or hybrid deployment and rapid, near-zero-downtime recovery via bare-metal restores, granular file and application-aware options, and push-button cloud failover with automated failback. Managed through a single pane of glass, it supports optional integrated hardware appliances or virtual-machine-based configurations, customizable scheduling with forever-incremental backups and immutable, hourly snapshots, plus comprehensive ransomware scanning, alerting, and remediation. The platform delivers VMware and Hyper-V protection with RTOs as low as two minutes, Microsoft application data recovery to fully functional states, and granular restores to files, folders, or VMs.
  • 19
    Mondoo

    Mondoo

    Mondoo

    Mondoo is a unified security and compliance platform designed to drastically reduce business-critical vulnerabilities by combining full-stack asset visibility, risk prioritization, and agentic remediation. It builds a complete inventory of every asset, cloud, on-premises, SaaS, endpoints, network devices, and developer pipelines, and continuously assesses configurations, exposures, and interdependencies. It then applies business context (such as asset criticality, exploitability, and policy deviation) to score and highlight the most urgent risks. Users can choose guided remediation (pre-tested code snippets and playbooks) or autonomous remediation via orchestration pipelines, with tracking, ticket creation, and verification built in. Mondoo supports ingestion of third-party findings, integrates with DevSecOps toolchains (CI/CD, IaC, container registries), and includes 300 + compliance frameworks and benchmark templates.
  • Previous
  • You're on page 1
  • Next