6 Integrations with Meridian Global LMS
View a list of Meridian Global LMS integrations and software that integrates with Meridian Global LMS below. Compare the best Meridian Global LMS integrations as well as features, ratings, user reviews, and pricing of software that integrates with Meridian Global LMS. Here are the current Meridian Global LMS integrations in 2025:
-
1
VIPRE Security Awareness
Inspired eLearning powered by VIPRE
Inspired eLearning, powered by VIPRE, delivers top-tier security awareness training to help organizations reduce human-related security incidents. By combining enterprise-grade software with simplified, targeted solutions, this training empowers employees to recognize and respond to today’s cyber-attacks. With over 15 years of enterprise cybersecurity expertise, Inspired eLearning offers three off-the-shelf packages, ranging from Security First: Select to Security First: Elite, designed to fit businesses of any size or experience level. Each package includes training, micro-learning modules, assessments, and phishing simulations through our PhishProof solution, all aimed at creating a Security First organization. Powered by automation, these solutions provide an effective, measurable approach to reducing security risks and building a strong security culture across your workforce.Starting Price: $16.75/user/year -
2
Inspired eLearning HR & Compliance
Inspired eLearning powered by VIPRE
A single harassment claim or compliance violation can be enormously costly – not just in lost dollars, but in lost time, productivity, morale, and reputation. Inspired eLearning’s HR and Compliance training online solutions guard against these risks. Backed by the nationally recognized employment law firm of Fisher Phillips, our programs provide proven culpability protection, while educating organizations on important governmental and industry requirements. Harassment in the workplace can lead to expensive lawsuits, low morale, lost reputation, and diminished profits. Inspired eLearning’s online harassment training program can protect your organization from litigation while building a supportive work environment in which all employees feel safe. Ethics form the bedrock of any organizational culture. Inspired eLearning can help build a culture in which employees reliably make decisions which reflect organizational values and conform with industry standards and regulations.Starting Price: $16.75/user/year -
3
Watershed
Watershed
Use Watershed to collect and standardize data across your learning ecosystem to automate reporting, reduce scrap learning, and provide a single source of truth. Watershed's learning record store (LRS) collects data via xAPI, proprietary connectors, and a data conversion engine; eliminating the constraints of getting access to siloed system data. The included learning analytics capabilities offer robust reporting options with data security, enterprise integration, and scalability top of mind.Starting Price: $2,100/month -
4
OpenSesame
OpenSesame
With the most comprehensive catalog of elearning courses from the world’s top publishers, we are here to help you every step of the way, from finding courses, mapping them to your core competencies, syncing them with your LMS to increasing utilization and improving your L&D programs. Our expertly curated catalog includes thousands of courses covering business skills, compliance, safety, technology, certifications, and industry-specific topics. -
5
iSecurity Audit
Raz-Lee Security
iSecurity Audit enhances native IBM i auditing by monitoring and reporting on all activities in the IBM i environment. It employs real-time detection to identify security events as they occur and record details in a log file. Audit logs can be displayed in simple, graphical formats with accompanying explanations for each entry to aid quick interpretation of statistical information. More importantly, real-time detection triggers alerts and/or takes immediate corrective action. iSecurity Audit is the only security auditing product available for the IBM i that is designed from the ground up for ease-of-use by non-technical personnel such as outside auditors and managers. Audit is a cutting-edge security auditing application that examines events in real time, and triggers alerts and other responsive actions to potential threats. It contains a powerful report generator with over one hundred pre-fabricated built-in reports. -
6
iSecurity AP-Journal
Raz-Lee Security
iSecurity AP-Journal protects business-critical information from insider threats and from external security breaches, and notifies managers of any changes to information assets and streamlines IBM i journaling procedures. iSecurity AP-Journal logs the who, what, when and which of activities. It logs database access (READ operations) directly into the journal receivers, which is not provided by IBM i journaling and is an important component of compliance. Monitors changes to objects, application files and members. Supports periodic file structure changes to application files. Enables monitoring application files across changes to file structures. Programmable field-specific exit routines. Real-time alerts indicating changes in business-critical data; these application alerts are activated by user-defined thresholds. Comprehensive reports displaying all application changes on a single timeline in various formats.
- Previous
- You're on page 1
- Next