Alternatives to IBM B2B Integrator

Compare IBM B2B Integrator alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to IBM B2B Integrator in 2026. Compare features, ratings, user reviews, pricing, and more from IBM B2B Integrator competitors and alternatives in order to make an informed decision for your business.

  • 1
    UTunnel VPN and ZTNA
    UTunnel provides Cloud VPN, ZTNA, and Mesh Networking solutions for secure remote access and seamless network connectivity. ACCESS GATEWAY: Our Cloud VPN as a Service offers swift deployment of Cloud or On-Premise VPN servers. It utilizes OpenVPN and IPSec protocols, enables policy-based access control, and lets you deploy a Business VPN network effortlessly. ONE-CLICK ACCESS: A Zero Trust Application Access (ZTAA) solution that simplifies secure access to internal business applications. It allows users to securely access them via web browsers without the need for a client application. MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution based on WireGuard enables granular access controls to business network resources and easy creation of secure mesh networks. SITE-TO-SITE VPN: The Access Gateway solution lets you easily set up secure Site-to-Site tunnels (IPSec) between UTunnel's VPN servers and hardware network gateways, firewalls & UTM systems.
    Leader badge
    Partner badge
    Compare vs. IBM B2B Integrator View Software
    Visit Website
  • 2
    SKUDONET

    SKUDONET

    SKUDONET

    SKUDONET Enterprise Edition is an Application Delivery and Security Platform built on Linux Debian 12.5 LTS for critical enterprise environments. Formerly known as Zevenet, it provides advanced L4/L7 load balancing, integrated WAF, TLS management with Let’s Encrypt and wildcard support, and protocol-aware traffic inspection across on-premises, hybrid, or cloud deployments, including SkudoCloud SaaS. A free trial is available for evaluation on the SKUDONET website. Key Features & Benefits: • High Availability: Clustering and failover to minimize downtime. • Advanced Security: WAF, L7 filtering, DoS protection, TLS with Let’s Encrypt and wildcard support. • Scalability: Optimized for high-throughput workloads with multi-core processing and efficient packet handling. • Traffic Control: Session persistence, custom routing rules, and granular L4/L7 inspection. • Centralized Management: Unified dashboard for configuration, monitoring, and policy automation.
    Starting Price: $1736/year/appliance
  • 3
    IBM Sterling File Gateway
    IBM® Sterling File Gateway enables companies to consolidate all internet-based file transfers on a single, scalable, secure and always-on edge gateway. The offering has the capabilities necessary to intelligently monitor, administer, route and transform high volumes of inbound and outbound files. Companies deploying File Gateway are empowered to lower the costs of managing file transfers, accelerate time to revenue and improve trading partner satisfaction. IBM Sterling File Gateway also supports hybrid cloud deployment through certified containers, seamless integration with RESTful APIs and high availability through IBM Sterling Global Mailbox. Reduce the cost of ownership to operate an edge-based gateway, accelerate time-to-revenue and improve partner satisfaction. Significantly reduce installation and patch time from hours to minutes by deploying your solution with a certified container that has all required components.
  • 4
    IBM Sterling Global Mailbox
    IBM® Sterling Global Mailbox 6.0 helps companies address demands for high availability operations and redundancy with a robust and reliable data storage solution available across geographically distributed locations. The solution supports active-active communications for disruption resiliency and disaster recovery in near real-time. Global Mailbox is available for IBM Sterling B2B Integrator and IBM Sterling File Gateway and designed to work with IBM Sterling Control Center. Provides capabilities to maintain high availability and efficient disaster resilience and recovery, including active-active communications. Real-time data replication eliminates the need for backup databases or custom-built approaches to disaster recovery. Flexible and configurable geographic distribution options to meet performance and customer-service level requirements. Enables always-on operations. Disaster resiliency and recovery. Configurable geographic distribution. Easy to use and intuitive UI.
  • 5
    IBM Sterling Connect:Direct
    IBM® Sterling Connect:Direct provides security-hardened, point-to-point file transfers to lessen dependency on unreliable File Transfer Protocol (FTP) transfers. It is optimized for high-volume delivery of files within and among enterprises. The solution ensures more reliable movement of files, from batch integration and movement of large images or catalogs to synchronization with remote locations. Sterling Connect:Direct also supports hybrid cloud deployment through certified containers which ensures easy and consistent deployment life-cycle management. IBM Certified Containers for Sterling Connect:Direct are enterprise-grade, security-rich product editions with integrated common software services for consistent deployment life-cycle management including easy install and configure options, management of upgrades and roll-back, scalability, and security. Supports a wide range of platforms including IBM z/OS, OpenVMS, i5/OS, HP NonStop, Microsoft Windows, UNIX and Linux.
  • 6
    Sangfor Athena SASE

    Sangfor Athena SASE

    Sangfor Technologies

    Sangfor Athena SASE is a cloud-native Secure Access Service Edge platform that combines advanced security features with wide-area network agility. It provides seamless, secure access to cloud resources, on-premises applications, and the internet for today’s distributed and hybrid workforce. The platform integrates Zero Trust Network Access (ZTNA), Secure Web Gateway (SWG), Firewall as a Service (FWaaS), Data Loss Prevention (DLP), and Endpoint Detection and Response (EDR) into a unified solution. Athena SASE simplifies network and security management through a single, centralized console, reducing complexity and operational overhead. Its global architecture supports fast, reliable connectivity anywhere, enabling smooth geographic expansion and regulatory compliance. This platform empowers organizations to secure hybrid work environments while optimizing performance and cost.
  • 7
    Azure NAT Gateway
    NAT Gateway is a fully managed service that securely routes internet traffic from a private virtual network with enterprise-grade performance and low latency. With built-in high availability using software-defined networking, you can easily configure, scale, and deploy outbound connectivity for dynamic workloads with NAT Gateway. Start securely connecting outbound to the internet with enterprise-grade performance and low latency by deploying a NAT (network address translation) gateway resource. With just a few clicks of a button, assign your NAT gateway to subnets within a single virtual network and static public IP addresses. NAT Gateway assumes the default route to the internet once configured to a subnet, with no traffic routing configurations required.
    Starting Price: $0.045 per hour
  • 8
    IBM Transformation Extender
    IBM® Sterling Transformation Extender enables your organization to integrate industry-based customer, supplier and business partner transactions across the enterprise. It helps automate complex transformation and validation of data between a range of different formats and standards. Data can be transformed either on-premises or in the cloud. Additional available advanced transformation support provides metadata for mapping, compliance checking and related processing functions for specific industries, including finance, healthcare, and supply chain. Industry standards, structured or unstructured data and custom formats. On-premises and hybrid, private or public cloud. With a robust user experience and RESTful APIs. Automates complex transformation and validation of data between various formats and standards. Any-to-any data transformation. Containerized for cloud deployments. Modern user experience. ITX industry-specific packs.
  • 9
    Sterling Virtual Data Room

    Sterling Virtual Data Room

    Sterling Technology

    Sterling Technology is the #1 European provider of virtual data room (VDR) solutions for the secure sharing of content, business process automation and collaboration for the M&A, corporate development, capital markets, private capital, banking and legal communities. Sterling has been supporting the capital and M&A markets for over 30 years, and since opening our first VDR in 2010 we have helped our customers successfully complete 1,000s of deals across over 90 industries. With offices in seven major European financial centres, Sterling is trusted by corporates, financial and legal advisors, real estate and private equity firms to deliver exceptional levels of service on their most critical transactions. Sterling Technology, a subsidiary of TransPerfect, is the leading provider of premium virtual data room (VDR) solutions for secure sharing of content, business process automation, and collaboration for the M&A, corporate development, real estate, capital markets, private capital, etc.
  • 10
    Secucloud

    Secucloud

    Secucloud

    Secucloud GmbH is active worldwide as a provider of high-availability cyber-security solutions, offering a cloud-based security-as-a-service platform particularly for providers. The Elastic Cloud Security System (ECS2) allows a wide range of markets and target groups (mobile communications & landline consumers, small businesses & home offices, SMEs) to enjoy the benefits of enterprise-level security solutions. This innovative platform does not require any special hardware or proprietary appliances, scales automatically, and is capable of supporting more than 100 million users and their connected devices. Secucloud is at the cutting edge of the cyber security industry and has maintained strong partnerships with industry leaders for years, combining their expertise with its own internal innovation cycles. The company is therefore excellently positioned to push the limits of what is possible in the fight against an increasingly complex landscape of cyber threats.
  • 11
    IBM Sterling B2B Integration SaaS
    A trusted, multi-enterprise cloud-based business network that helps streamline, automate and fully digitize B2B transactions, augmenting the power of EDI with API capabilities. IBM Sterling® B2B Integration SaaS, formerly known as IBM Sterling Supply Chain Business Network, is part of the IBM Sterling Data Exchange portfolio of solutions. It is a cloud-based platform that enables businesses to efficiently connect and exchange data with their customers, suppliers, distributors and other trading partners using electronic data interchange (EDI) formats or application programming interfaces (APIs). It provides real-time visibility into critical business documents such as purchase orders, invoices and shipping notices. Automated document processing and analytics and reporting tools help businesses make data-driven decisions.
  • 12
    Avast Secure Web Gateway
    Block web threats before they hit the network - secure your network traffic without additional proxy servers or on-premise appliances. Filter web traffic and keep unwanted malware away from networks. Secure Web Gateway is simple to deploy and manage across multiple locations, and can be set up in minutes. Devices are automatically directed to the nearest data center for lightning-fast connections from anywhere in the world. Our threat network is geographically dispersed with over 100 data centers, on five different continents, and draws from dozens of top threat feeds that act as vigilant security guards, observing, processing, and reporting on around 30 billion requests per day. When an uncategorized web address is accessed via Secure Web Gateway, the site gets inspected for threats and categorized into one of dozens of categories, resulting in constant updates to the whole security network.
  • 13
    Kaspersky Security for Internet Gateway
    Working with the World Wide Web is critical to the majority of today's businesses. Your corporate internet gateway doesn't just give access to internet resources for your employees - it also provides an entry point for cyberthreats out to target them through social engineering, and to attack your endpoints with sophisticated malware. Kaspersky Security for Internet Gateways offers significant risk reduction in areas including infection, data leaks and internet distractions. Provides multi-layered gateway-level protection against the latest web-based threats. Blocks infections before they can reach your endpoints. Negates the effects of social engineering. Readily complements your existing gateway-level defenses. Reduces your exposure to attack by controlling internet resource usage. Supports and assists regulatory compliance initiatives.
  • 14
    Sterling CMMS

    Sterling CMMS

    Sterlingsoft

    The Sterling Computerized Maintenance Management System (Sterling CMMS) is a powerful system designed exclusively for service-related businesses to help you save time and stay organized in managing your information. It is a cost effective solution that automates daily processes to improve productivity and increase efficiency of your business. If providing services to your Fleet, Plant, Building and Facilities at the highest possible standard is the aim of your organization, Sterling CMMS is the solution for you! At Sterling Cloud Auto Sdn Bhd, we specialize in creating, developing and designing software for small, medium and corporate organizations. We provide organizations with a proven set of industry-specific best practices, and business processes, thus empower the user to consistently deliver superior customer experiences and establish more profitable customer relationships. We also believe in providing the best products and services to our customers.
  • 15
    AppXML

    AppXML

    Radware

    AppXML is a comprehensive web service gateway for enhancing service oriented architecture (SOA) deployments. It improves the speed of document processing and secures XML-based communications, functioning as a trusted intermediary for exchanging secure Web services between your enterprise and business partners. It offers administration and reporting capabilities needed to manage web service gateway deployment including policy management, status monitoring, alerts, logs and reporting activities. By adding a layer of infrastructure between the network layers and applications, it simplifies, secures and accelerates XML and web service gateway security deployments, helping you achieve a higher ROI. Improves the speed of XML document processing and secure XML-based communications by offloading tasks to dedicated hardware. Business-level protection from both unintended and malicious attacks without modifying web services or altering and rewriting applications.
  • 16
    Kennect

    Kennect

    Sterling Talent Solutions

    On-demand background screening. Fast, compliant, and reliable employment screening solutions for small businesses. You’ve worked hard to build your business and establish trust with your customers. Protect your brand with comprehensive background screening from SterlingNOW. Many other providers rely exclusively on a national database search, with no data verification. SterlingNOW goes straight to the source to provide a more complete picture of criminal history, and results undergo QA for validation and compliance. SterlingNOW leverages proprietary CourtDirect technology to deliver trusted results quickly. 70% of criminal searches are complete within the hour, and 90% are done within a day. Sterling has pioneered background screening innovation for more than 45 years, serving over 50,000+ customers, and conducting more than 95 million checks annually.
  • 17
    FortiGate SWG
    Secure Web Gateway (SWG) solutions, enterprise-class protection against internet-borne threats. Secure Web Gateway (SWG) solutions use web filtering to enforce company Internet access policies. They also filter unwanted software, especially malware, from user-initiated Internet connections. SWGs are hugely important as enterprises have continued to evolve their WAN Edge. Applications are rapidly migrating to the cloud, and the attack surface at remote sites and branch locations continues to increase. Security risks are especially high for web-based traffic, and as attack techniques become more advanced, organizations need an integrated approach to secure against external and internal risks. An SWG solution should include URL filtering, application control, deep HTTPS/SSL inspection, data loss prevention and remote browser isolation capabilities. Fortinet's SWG provides flexible deployment options, including explicit, transparent, and inline modes.
  • 18
    ProxySG and Advanced Secure Gateway
    Symantec delivers high-performance on-premises secure web gateway appliances that protect organizations across the web, social media, applications, and mobile networks. Combine with cloud-delivered Web Security Service for a centrally-managed, hybrid secure web solution. Symantec protects organizations with a scalable, high-performance web proxy appliance designed to secure communications from advanced threats targeting web activity. Symantec Secure Web Gateway solutions draw on a unique proxy server architecture that allows organizations to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience. Get complete visibility into SSL/TLS-encrypted web traffic with Symantec's advanced secure web proxy and cloud security solutions. Symantec Web Isolation prevents websites from delivering zero-day malware, protects users' devices by executing web sessions away from endpoints, and safely sends rendering information to the browser.
  • 19
    Zecurion SWG
    Control access to web resources and protect against mixed threats with Zecurion Secure Web Gateway. Neither affects the network performance nor slows down existing processes. Neither affects the network performance nor slows down existing processes. Enterprise-level performance and rich functionality. Operates in networks with up to 200K workstations. Prevents attacks with the built-in IDS/IPS module. Supports HTTP, HTTPS, FTP over HTTP and other protocols. Native integration with DLP. Integration with any other software through ICAP. The most accurate and up-to-date content filtering database. Sites are categorized manually by a person rather than by a robot. Daily database updates. More than 100 resource categories. Fast categorization of new and unknown web sites. Policies with per-user granularity. Over 5 million URLs in the database. A single solution for monitoring the entire corporate threat landscape. Try zecurion SWG together with zecurion dlp!
  • 20
    Sterling

    Sterling

    Sterling

    Sterling—a leading provider of background and identity services—provides background, identity verification, and Covid-19 health testing services that help over 40,000 clients create people-first cultures built on foundations of trust and safety. Our tech-enabled services help organizations create great environments for our workers, partners, and customers. With operations around the world, Sterling conducts more than 75 million searches annually. Deep regional expertise, local service proficiency, and reliable global fulfillment capabilities. Deep market expertise with services specifically designed to meet the needs of clients’ businesses and industries. Tech-enabled services for simplified client and candidate experiences, robust integrations, and fast turnaround times. Innovative, scalable, and customized solutions that help improve processes and speed.
  • 21
    Barracuda Web Security Gateway
    The Barracuda Web Security Gateway lets organizations benefit from online applications and tools without exposure to web-borne malware and viruses, lost user productivity, and misused bandwidth. As a comprehensive solution for web security and management, it unites award-winning spyware, malware, and virus protection with a powerful policy and reporting engine. Advanced features ensure that organizations adapt to emerging requirements like social-network regulation, remote filtering, and visibility into SSL-encrypted traffic. Unlimited remote user licenses are included to enforce content and access policies for mobile devices outside of the corporate network. The Barracuda Web Security Gateway is also available as a virtual appliance. For hosted web security, see Barracuda Content Shield.
  • 22
    Forcepoint URL Filtering
    Forcepoint URL Filtering is the industry’s most effective, continually up-to-date web filtering solution. Powered by our ThreatSeeker Intelligence, Forcepoint URL Filtering collects and analyzes up to 5 billion incidents every day (from over 155 countries), producing updated threat analytics for Forcepoint solutions at up to 3.2 updates per second. Forcepoint URL Filtering blocks web threats to reduce malware infections, decrease help desk incidents and provide relief to valuable IT resources. Forcepoint URL Filtering is an easy-to-deploy, transparent filter and security solution that avoids the complexity of a proxy gateway. It’s equipped with more than 120 security and web filtering categories, hundreds of web application and protocol controls, and 60-plus reports with customization and role-based access. Identify threats with over 10,000 analytics, machine learning and other advanced techniques maintained through real-time global threat intelligence with Forcepoint Web Security.
  • 23
    IronMQ

    IronMQ

    Iron.io

    MQ provides a reliable way to communicate between services and components. Highly available, persistent by design, with best-effort one-time delivery, MQ is the most industrial-strength, cloud-native solution for modern application architecture. Supports a rich set of features including push and pull queues, long polling, error queues, alerts and triggers, and more. MQ is a global service that runs on multiple clouds and availability zones. For advanced users with critical messaging needs, queues can automatically point to alternative zones in case of an outage without having to change any code. Runs on top of cloud infrastructure and uses multiple high-availability data centers. MQ scales without the need for you to add and maintain resources yourself. Uses HTTPS/Rest-based APIs for simple and efficient cloud use. Built with MQ standards in mind for maximum flexibility and configuration.
    Starting Price: $24.99 per month
  • 24
    Sangfor Athena SWG

    Sangfor Athena SWG

    Sangfor Technologies

    Sangfor Athena SWG is a secure web gateway designed to protect organizations from threats arising through user internet access behavior, especially as cloud adoption and hybrid work increase. It provides visibility into encrypted traffic and identifies proxy avoidance attempts that bypass traditional security perimeters. The platform offers precise application control, intelligent traffic management, and gateway decryption to monitor and manage internet usage effectively. Athena SWG integrates with endpoint security to enforce proxy avoidance protection, ensuring comprehensive defense against bypass techniques. It supports centralized network-wide management and bandwidth optimization, improving productivity by controlling non-work-related applications. Trusted across industries, Athena SWG helps organizations secure user internet access while maintaining compliance and operational efficiency.
  • 25
    ContentKeeper

    ContentKeeper

    ContentKeeper Technologies

    Today's organizations require a security solution that scales for future expansion, integrates seamlessly with existing technology, centralizes policy management and provides control across remote locations and mobile users. ContentKeeper’s Secure Internet Gateway (SIG) helps prevent malware and ensures policy management on any device. Our Multi-layered Web Security Platform approach provides full visibility into web traffic and activity, without impacting network performance or adding complexity. Uses multiple layers of defense, including machine learning/predictive file analysis, behavioral analysis, cloud sandboxing and threat isolation to prevent malware and advanced persistent threats. Designed for high demand networking environments. Simplifies security and policy management and ensures safe and productive web use regardless of device or location.
  • 26
    Symantec WebFilter / Intelligence Services
    Powered by the Global Intelligence Network, Symantec WebFilter and Intelligence Services deliver real-time web content protection, security categorization and web application control. The web filtering service automatically filters and categorizes billions of URLs into over 80 predefined categories, including 12 security categories that can be easily managed by IT administrators. When combined with Symantec Secure Web Gateway, including Blue Coat ProxySG, you have the most accurate and granular web application control policy engine for your entire enterprise web filter and cloud access protection. The Advanced Intelligence Services provide additional new services that add more flexibility and options to your webfilters, content control, policy and security management with URL threat risk levels and geolocation.
  • 27
    B to B-Link

    B to B-Link

    B to B Visions

    B to B-Link surpasses other integration systems with the integration management tools provided. This is accomplished with history, audit trails, in depth error trapping and handling, data validation, scheduling and filtering tools. Using the mailbox, B to B-Link users have the ability to control the flow of documents in or out of MAS 90/200 as batches or in real-time as information is added into the accounting system. At the core of B to B-Link, is the mailbox. The mailbox provides a simple to use intuitive interface similar to Microsoft Outlook, built directly into the accounting system for management of all your imported and exported documents.
  • 28
    MONITORAPP AISWG
    Secure Web Gateway(SWG) AISWG, we can’t see with our eyes what sites pose threats to undermine corporate assets and the secure working environment for internal users. AISWG is a secure web gateway that blocks harmful sites and prevents the information from being leaked. AISWG is a vital solution to protect corporate assets from various threats. As we work more and more through the Web, we are exposed to many web sites that threaten asset and business productivity. Accessing non-business sites wastes valuable business hours, and visiting harmful websites with malicious codes may result in valuable corporate assets being taken away. In addition, improper web uploads information and leaks company assets easily. Secure Web Gateway (SWG) is the security solution for effectively controlling the use of the web itself to reduce corporate productivity and protect business assets. AISWG increases business efficiency by monitoring internal client web access.
  • 29
    IBM Sterling Configure, Price, Quote (CPQ)
    IBM Sterling CPQ transforms and automates configuration, pricing and quoting of complex products and services. IBM Sterling CPQ transforms the buying and selling of complex products and services across all of your buyers' preferred channels to make it easier for your customer to buy from you. Our CPQ software solution guides eCommerce customers, sales teams, call center representatives, and partners to select the right products and ensure pricing is accurate. IBM Sterling CPQ helps you provide the buying experiences today's customers demand, while improving your sales productivity. CPQ provides automated online sales process for accurate configuration of solution bundles with cross-sell, up-sell opportunities, which improves customer satisfaction and lowers call center volumes. CPQ eliminates manual pricing execution with a centralized system that enforces pricing consistency and automates pricing changes while enabling business users to facilitate price maintenance.
  • 30
    Skyhigh Security Secure Web Gateway (SWG)
    Understand and govern your web access to protect users from zero-day threats and enforce data protection everywhere with a mature, web security solution and an integrated component of Skyhigh Security SSE. Skyhigh Security Secure Web Gateway (SWG) is the intelligent, cloud-native web security solution that connects and secures your workforce from malicious websites and cloud apps—from anywhere, any application, and any device. Connects users seamlessly and without disruption through Hyperscale Service Edge with cloud-native web security that operates with blazing fast ultra-low latency and 99.999% uptime. Protects users, data, and applications to minimize cloud and web attack surface through integrated remote browser isolation and real-time insights to Cloud Security Advisor that generates automatic risk-scoring. Controls access to all cloud services and protects against the risk of data loss from a single console using our robust DLP engine with integrated CASB functionality.
  • 31
    OpenText B2B Integration Enterprise
    OpenText B2B Integration Enterprise is a cloud‑based, managed EDI‑as‑a‑Service platform that simplifies complex enterprise integration by combining a scalable, high‑availability infrastructure with decades of B2B expertise and a pre‑connected global trading community. It offers a unified integration environment that connects over one million trading partners and processes thirty‑one billion transactions annually, enabling organizations to modernize legacy systems without additional hardware, accelerate time‑to‑market for products and channels through self‑service onboarding and auto‑provisioning, and eliminate internal silos by supporting any‑to‑any connectivity via EDI, XML, APIs, and PEPPOL adapters. Built‑in managed services include proactive system monitoring, health checks, data backups, and application support, while real‑time visibility and alerting dashboards deliver end‑to‑end transaction insights and business event notifications.
  • 32
    Verizon Secure Gateway
    Combine the secure reach and broad capacity of private networks with the convenience of the public internet. Get reliable, encrypted access to remote locations. Delivered through a cloud-based port, Secure Gateway extends your WAN environments to remote locations and users. With this fully managed, centralized gateway security, your customers and employees can use a variety of wireless and broadband access options to securely connect and collaborate virtually anytime and virtually anywhere. Secure Gateway services enable Private IP customers to provide secure remote access to applications on their corporate network and secure access to the public internet from remote locations. Extend your network to remote workers, smaller sites that may not need premium connections and remote locations that are hard to reach while helping to keep employees productive. Give employees secure access to critical information and apps virtually anywhere.
  • 33
    Check Point URL Filtering

    Check Point URL Filtering

    Check Point Software Technologies

    Web access is a predominant route for attacks on enterprises. Check Point URL Filtering controls access to millions of web sites by category, users, groups, and machines to protect users from malicious sites and enable safe use of the Internet. URL Filtering employs UserCheck technology, which educates users on web usage policy in real time. Protects users with cloud-based categorization and UserCheck technology. Enable on any Check Point security gateway reducing total cost of ownership. Unified security across all aspects of the web with full application control integration. Security teams must be able to isolate, secure, and control every device on the network at all times. Check Point solutions provide you with the ability to block infected devices from accessing corporate data and assets, including employees’ mobile devices and workstations, IoT devices and industrial control systems.
  • 34
    Kitecyber

    Kitecyber

    Kitecyber

    Kitecyber provides a hyper-converged endpoint security solution that provides comprehensive security and meets compliance requirements of organizations for SOC2, ISO27001, HIPAA, PCI-DSS, GDPR etc. Our unique endpoint-based approach eliminates the need for cloud gateways or local appliances. The hyper-converged offering includes the following protections: 1) Secure Web Gateway to safeguard internet access 2) Eliminate Shadow SaaS and Shadow AI) 3) Anti-Phishing measures to protect user credentials 4) Zero Trust Private Access (Next gen VPN) 5) Data Loss Prevention across all devices—Mac, Windows, and mobile 6) Device Management for Mac, Windows, and mobile for all employees, BYOD devices and 3rd party contractors 7) Continuous Compliance Monitoring 8) User Behavior Analysis to identify potential risks
  • 35
    FortiProxy

    FortiProxy

    Fortinet

    As attacks become more versatile, organizations need an integrated approach to secure from malicious web traffic, websites, and viruses. Fortinet's secure web gateway, FortiProxy, addresses these issues with one, unified product to protect against web attacks with URL filtering, advanced threat defense, and malware protection. Defend end-users from internet-borne threats and enforce policy compliance. Secure Web Gateway addresses a set of overlapping security problems within one product. Using one solution which protects against web attacks with URL filtering, advanced threat defense and malware protection to defend users from internet-borne threats and help enforce internet policy compliance. FortiProxy is a secure web proxy that protects employees against internet-borne attacks by incorporating multiple detection techniques such as web filtering, DNS filtering, data loss prevention, antivirus, intrusion prevention, and advanced threat protection.
  • 36
    Cobra Trading

    Cobra Trading

    Cobra Trading

    Cobra TraderPro is our most cost-conscious platform. Based on the Sterling Trader framework, the platform is loaded with features without sacrificing any of the features needed for active traders or investors. The Cobra TraderPro platform offers real-time Level 2 market data, advanced charting, hot keys, and a short locate monitor. DAS Trader offers advanced order types, basket trading, charting, and multi-account management in a real-time environment. DAS combines powerful features such as advanced analytics, multi-instrument trading, and portfolio management into a single trading platform. Sterling Trader is one of the leading direct-access trading platforms for trading equities and options. The platform is fully customizable to the needs of individual traders to deliver a singular, exceptional trading experience. RealTick® EMS is the online trading industry’s premier downloadable, direct-access research and trading software.
  • 37
    Trend Micro Web Security
    Trend Micro™ Web Security protects against cyber threats before they reach your users. It uses crossgenerational defense techniques to catch known and unknown threats, giving you visibility and access control on unsanctioned cloud applications for each of your users. Our unique deployment model provides you with the flexibility to deploy gateways on-premises, in the cloud, or both—protecting your users no matter where they are. One cloud-based management console simplifies your workload, letting you set up policy, manage users, and access reporting across a single pane of glass. Trend Micro Web Security stops threats directly in the cloud before they get to your endpoints. Your users will be protected across any device—including desktop and mobile platforms—at any location, whether on the corporate network or not.
  • 38
    Passages

    Passages

    Ntrepid

    With Passages, your users can access any website and follow any link without risk to your infrastructure or data, and you can monitor and manage it all with ease. The technologies and components in Passages are proven and mature, having evolved from the hardened Internet platforms Ntrepid developed over the last 15 years for the national security community. They put our solutions to the test against some of the world’s most sophisticated and aggressive opponents. Corporate security breaches come through the web because conventional malware protection and firewalls are not enough. The solution is malware isolation. Contain and eliminate web-delivered malware with Passages, protecting your valuable data and infrastructure. Highly targeted attacks are the new favorite technique of sophisticated hackers, but they can’t target people or corporations that they can’t identify. Hide your IP address and identifying information to avoid these dangerous attacks.
  • 39
    Trustwave Secure Web Gateway
    Delivers real-time protection against malware and provides strong policy enforcement, with the added option of having the technology handled by our experts and augmented by our intelligence without you ever losing control. Your employees rely on the web and email to do their jobs, but cybercriminals are lurking in the background 24/7. A Secure Web Gateway responds by keeping your staff's endpoints free of internet-borne malware infections, while enforcing your company's policies. Reap the rewards of continuity, scalability and reduced costs with a cloud deployment that can extend across your enterprise to remote offices and roaming users. Retain control of the data in your environment with an on-premises solution that comes equipped with multi-layered anti-malware and behavior-based security engines to drive performance and scale. Our experts take the work out of your hands, designing and updating security and control policies based on your needs and direction.
  • 40
    PDC Gateway

    PDC Gateway

    Iomotion

    At IOMOTION we know that getting time information from employees on the shop floor or elsewhere into SAP® can be a major challenge. The PDC Gateway™ Integration Platform is the proven solution developed over many years and deployed worldwide in some of the most demanding environments. We have developed this product to easily solve many types of requirements, from the simplest Kronos® Clock to flat file interface to the most complex near real-time SAP® HR, PP, PM to Kronos® WFA bi-directional interface. For over fifteen years, IOMOTION has supplied its customers with SAP® and Kronos® integration solutions. The PDC Gateway™ was developed for exactly this purpose and was certified by SAP® and Kronos® many years ago. It has since been further enhanced and refined to meet today's hardware and software requirements. Our mission is to listen to our client's specific needs and deliver cost effective solutions that can be implemented quickly and under budget.
  • 41
    fire.com

    fire.com

    fire.com

    With our technology, API and regulatory licences, Fire delivers solutions that make payments faster, more cost effective and secure. From Mastercard® debit cards and bank transfers to a host of API services, a Fire Business Account gives you all the features of a premium business account – but with so much more. Open any number of Sterling and Euro accounts and order as many debit cards as you need. Get notified in real-time and integrate your systems to automate payment processes. Open Sterling and Euro accounts to manage payments and simplify reconciliation. Create additional accounts in real-time. Use them to segregate funds, simplify reconciliation processes or manage projects and expenses. Pay and get paid by bank transfer to and from any bank account in the UK or Eurozone.
    Starting Price: €0.49 per transfer
  • 42
    IBM DataPower Gateway
    IBM® DataPower® Gateway helps you meet the security and integration needs of your digital business in a single multichannel gateway. It provides high security, control, integration and optimized access to a full range of mobile, web, app programming interface (API), service-oriented architecture (SOA), B2B and cloud workloads. DataPower Gateway offers content introspection at wire speeds, service request and response monitoring to support a centralized management and control platform. DataPower appliances deliver a robust XML firewall for the enterprise, using sophisticated checks. The DataPower appliance enables the classification of data requests based on service and application-level information. Enterprise-grade security with the highest level of security assurance certification for critical enterprise apps.
  • 43
    IBM Sterling Partner Engagement Manager
    IBM® Sterling Partner Engagement Manager significantly reduces the time and resources required to onboard new partners while managing and maintaining existing partners. By automating the onboarding process, Partner Engagement Manager limits costly manual errors and increases efficiency as partners can maintain their own records. From IBM’s point of view, establishing a business relationship with a partner includes three considerations. The onboarding activities necessary to set up a new partner or new document with an existing partner. A “continuous-touch” approach to managing the relationship. Offering line-of-business and partner staff the self-service necessary to end reliance. To better understand IBM’s approach to alleviating your onboarding pain, PEM features, and PEM architecture, read this technical overview of IBM Sterling Partner Engagement. Centrally manage contact and certificate data to eliminate manual, repetitive tasks while progress dashboards monitor activity.
  • 44
    Sterling Stock Picker

    Sterling Stock Picker

    Sterling Stock Picker

    ​Sterling Stock Picker is an award-winning stock-picking software designed to empower individuals to invest confidently, regardless of their experience level. It offers a user-friendly interface that guides users through discovering their risk tolerance, selecting stocks aligned with personal values, and building a diversified portfolio. Key features include the North Star Ranking System, which provides clear buy, sell, hold, or avoid recommendations based on a comprehensive analysis of over 60,000 publicly traded companies. It integrates real-time data, social sentiment analysis, and financial metrics to deliver actionable insights. Users can access Finley, an AI-powered financial coach, for personalized guidance and strategic investment advice. Additionally, Sterling Stock Picker offers educational resources through the PRO$PER system, providing on-demand courses to enhance financial literacy and investment skills.
    Starting Price: $29 per month
  • 45
    Sterling Warehouse Management System
    The IBM® Sterling Warehouse Management System is a web-based application that provides a comprehensive end-to-end solution, thus helping businesses manage their inventory and processes throughout their network, through a synchronized warehouse management system. Sterling Warehouse Management System is built using a robust architectural framework that provides enough flexibility to adapt to changing business needs. Granular tracking of inventory at a location, case, or pallet based on item attributes, including lot number, serial number, and so forth. Management, visibility, and monitoring of inventory in a warehouse. Comprehensive visibility to inbound shipments. Management, visibility, and monitoring of tasks in a warehouse. Kitting and dekitting for static or dynamic Bill of Materials (BOM). Customer compliance such as special ticketing, security tagging, and so forth.
  • 46
    Clearswift Secure Web Gateway
    Clearswift’s Secure Web Gateway (SWG) gives organizations the ability to enforce consistent internet security through flexible and granular policy management across web traffic, web-based applications, and cloud collaboration platforms. Prevent accidental data leaks with real-time content and context aware scanning that can detect and modify sensitive information being shared across the web such as social posts or document uploads to websites or cloud based applications. With SWG, monitor web traffic and prevent access to inappropriate or malicious sites as well as remove suspicious scripts or harmful executables from downloaded content. SWG empowers you to balance the need to protect critical information entering and leaving your organization with the ability to continuously collaborate with customers, suppliers, and partners across the web.
  • 47
    Sterling Software

    Sterling Software

    Custom Data Systems

    Sterling Software was created by Custom Data Systems Inc. (CDSI), a Washington Corporation based in Spokane Washington. CDSI has worked to satisfy the needs of small and large companies to transition from paper systems or older computer systems to newer technologies since 1990. CDSI works with companies all over the United States, Canada and Hawaii. Your data can be converted! We can convert from HMIS, Pontum, MBS, Phoenix, CemSoft and many others! Then your data will reside in a secure SQL Database that we believe belongs to you. Sterling Management Software is a Web browser-based system that uses a Microsoft SQL Server Relational Database. Custom Data Systems also offers a Cloud-based solution which is the most economical solution since it eliminates the need for an on-site Server.
  • 48
    Menlo Security

    Menlo Security

    Menlo Security

    Our platform invisibly protects users wherever they go online. So threats are history and the alert storm is over. Explore the key ingredients that make the Menlo Security platform so secure, seamless, and simplified. Fueling our unique approach to security, the Elastic Isolation Core protects against known and unknown threats, and isolates them before they get to users. Zero Trust isolation provides 100% protection with no need for special software or plug-ins, so users experience no impact on performance or interruption in workflow. Cloud-native and high performance, the Elastic Edge is built to scale globally on demand. It dynamically scales to meet enterprise-level growth—from 1000 users to over 3M— with no performance hit, and is easily extendible with a rich set of APIs and integrations.
  • 49
    Lookout

    Lookout

    Lookout

    Our mission is to secure and empower productivity in a privacy-focused world, where work and play can happen anywhere. With everything now in the cloud, it’s critical that cybersecurity follows you wherever you go, securing your data from the endpoint all the way to the cloud. Mobility and cloud technology have become essential, as most of us now work and manage our personal lives digitally. With a platform that integrates endpoint and cloud security technologies, Lookout solutions can be tailored for any industry and any company size, from individual users to large global enterprises and governmental organizations. Cloud access doesn’t have to be all or nothing. Security shouldn’t interrupt productivity or impair the user’s experience. With visibility and insights into everything, we enable you to secure your data by dialing in precise access and providing a seamless and efficient experience.
  • 50
    Zorus Archon Web Filtering
    A complete web filtering platform, engineered for managed service providers. Archon filters traffic through a proxy system, allowing you to grant access to some parts of a site while blocking others. Centrally managed and deployed with a single click, Archon eliminates the need to maintain costly hardware. Capable of learning from each new deployment and scanned site, Archon self optimizes. Traditional UTM systems only protect devices inside their networks. Archon protection travels with the device. Protect your clients everywhere they’re doing business. According to Gartner, 50% of employees will continue to work remotely, even after COVID-19 ends. Traditional security platforms like corporate firewalls and VPNs don’t take into consideration new work trends, like hybrid work from home. Employees can access services like e-mail and cloud storage from multiple devices, including from their personal endpoints. Archon was built with geographic diversity in mind.