10 Integrations with OrangeCRM

View a list of OrangeCRM integrations and software that integrates with OrangeCRM below. Compare the best OrangeCRM integrations as well as features, ratings, user reviews, and pricing of software that integrates with OrangeCRM. Here are the current OrangeCRM integrations in 2025:

  • 1
    FlexPay

    FlexPay

    FlexPay

    FlexPay is the leading failed payment recovery solution for businesses with a subscription or recurring billing payment model. FlexPay’s innovative platform uses multiple technologies to achieve the highest number of retained customers, resulting in reduced involuntary churn, longer life span after recovery, and higher revenue. Leading brands like LegalZoom, Hooked on Phonics, and ClinicSense trust FlexPay to recover failed payments, reduce churn, and increase customer lifetime value. FlexPay’s AI-driven INVISIBLE RECOVERY™ technology works directly with the payments system to quickly resolve failed payments without customer involvement. When customer help is needed, ENGAGED RECOVERY™ maintains a positive customer experience. FlexPay integrates with 100+ billing and payment processing systems including Stripe, ARIA, Recurly, and Chargebee, meaning quick set-up, no disruptions to billing, and instant recovery improvements compared to traditional in-house recovery methods.
    View Software
    Visit Website
  • 2
    Bryj

    Bryj

    Bryj

    Bryj delivers incredible mobile app experiences faster, on budget, and with fewer resources through its end-to-end, AI-powered SaaS platform. From idea to ongoing success, the Bryj platform powers apps with a single source solution that seamlessly connects enterprise systems, provides intelligent analytics and Al, advanced UX marketing tools, app studio configurator, and a world-class customer experience. You can trust that we have everything you need to launch and maintain a successful mobile app for any app store worldwide. Benefit from the ongoing support of our tech and expert team, so you never have to worry about future OS or device changes, app store publishing, monitoring, or security. Let us handle the technical details so you can focus on growing your business. That's enterprise-level peace of mind.
    Starting Price: $1,000/app/month
  • 3
    Project Calico

    Project Calico

    Project Calico

    Calico is an open-source networking and network security solution for containers, virtual machines, and native host-based workloads. Calico supports a broad range of platforms including Kubernetes, OpenShift, Mirantis Kubernetes Engine (MKE), OpenStack, and bare metal services. Whether you opt to use Calico's eBPF data plane or Linux’s standard networking pipeline, Calico delivers blazing-fast performance with true cloud-native scalability. Calico provides developers and cluster operators with a consistent experience and set of capabilities whether running in the public cloud or on-prem, on a single node, or across a multi-thousand-node cluster. Calico gives you a choice of data planes, including a pure Linux eBPF data plane, a standard Linux networking data plane, and a Windows HNS data plane. Whether you prefer the cutting-edge features of eBPF or the familiarity of the standard primitives that existing system administrators already know, Calico has you covered.
    Starting Price: Free
  • 4
    Junos Traffic Vision

    Junos Traffic Vision

    Juniper Networks

    Junos Traffic Vision is a licensed traffic sampling application for MX Series 3D Universal Edge Routers. It provides details on network traffic flows that is useful for a wide variety of operations and planning activities. Junos Traffic Vision monitors packets as they are processed by the router, and captures details such as source and destination addresses, packet and byte count information. These details are aggregated and exported in a standards-based format for analysis and presentation by Juniper and third-party-based tools that support usage-based accounting, traffic profiling, traffic engineering, attack and intrusion detection, and SLA monitoring. Implemented inline and on service cards that provide high performance and scale, Junos Traffic Vision can be deployed in both active and passive configurations and can take place alongside lawful intercept filtering and port mirroring without impacting performance.
  • 5
    wolfSSL

    wolfSSL

    wolfSSL

    wolfSSL is an open source internet security company who's primary product is the wolfSSL embedded SSL Library. Its primary users are programmers building security functionality into their applications and devices. wolfSSL employs the dual licensing model, like MySQL, so it is available under commercial license terms for our commercial users and open source for the open source community. Support and consulting are also available from wolfSSL. wolfSSL is the most popular SSL/TLS security option for the IoT. We secure devices against the IoT's most prevalent threat vector, which is the MITM (man in the middle) attack. wolfSSL is also popular for use in heavy load server side or cloud environments, where cryptography performance is vital. Government applications also consume wolfSSL embedded SSL, as it is FIPS 140-2 enabled. Over 2 Billion applications and devices are secured with wolfSSL products.
  • 6
    Proofpoint Digital Risk Protection
    Proofpoint Digital Risk Protection secures your brand and customers against digital security risks across web domains, social media, and the deep and dark web. It’s the only solution that gives you a holistic defense for all your digital engagement channels. Digital Risk Protection secures your company and customers from digital risks for your entire social media infrastructure. Our solution protects your social media presence from account takeovers, social media phishing scams, and malicious content. When you request a demo, you can map your social, mobile, and domain footprint to discover your brand-owned and fraudulent or unauthorized accounts. Protect your brand and customers from social media, web domain and dark web threats. Protect your domain investments from domain squatters, typo phishing campaigns and other infringing domains. Our digital protection solution applies artificial intelligence to uncover fraudulent domains that pose a risk to your brand and customers.
  • 7
    Onfido

    Onfido

    Entrust

    Onfido, an Entrust company, is a technology provider specializing in AI-powered digital identity verification to help businesses securely and efficiently onboard customers. Its Real Identity Platform verifies users by analyzing government-issued IDs and matching them with facial biometrics, ensuring accurate authentication. Supporting various document types, including passports and driver’s licenses, Onfido integrates seamlessly with business systems to create a frictionless user experience. Its solutions help organizations reduce fraud, comply with global regulations, and streamline customer acquisition. With a focus on trust and security, Onfido enables businesses to verify identities with confidence in an increasingly digital world.
  • 8
    TEOCO SmartHub Analytics
    SmartHub Analytics is a dedicated telecom big-data analytics platform that enables financial and subscriber-based ROI-driven use cases. Designed to support and encourage data sharing and reuse, SmartHub Analytics optimizes business performance and delivers analytics at the speed of thought. SmartHub Analytics eliminates silos and can assess, validate and model vast amounts of data from across TEOCO’s solution portfolio, including: customers, planning, optimization, service assurance, geo-location, service quality and costs. As an added analytics layer residing on top of other existing OSS & BSS solutions, SmartHub Analytics provides a standalone analytics environment with a proven return on investment (ROI), saving operators billions. We consistently uncover significant cost savings for our customers, utilizing prediction-based machine learning algorithms. SmartHub Analytics remains at the forefront of technology, delivering accelerated data analyses.
  • 9
    Synack

    Synack

    Synack

    Comprehensive penetration testing with actionable results. Continuous security scaled by the world’s most skilled ethical hackers and AI technology. We are Synack, the most trusted Crowdsourced Security Platform. What can you expect when you entrust your pentesting to the Synack Crowdsourced Security platform? Become one of the select few SRT members and hack among the best in the world, sharpening your skills and putting them to the test. Hydra is an intelligent AI scanning tool that alerts our SRT members of possible vulnerabilities, changes, or events. In addition to bounties for finding vulnerabilities, Missions provide payment for methodology-based security checks. Trust is earned, and our currency is straightforward. A commitment to protect our customers and their customers. Utter confidentiality. Optional anonymity. Total control over the process. Complete confidence when you need to focus on your business.
  • 10
    Chargeback Gurus

    Chargeback Gurus

    Chargeback Gurus

    Our industry expertise combined with proprietary FPR-360 technology allows us to recover 3x more chargebacks than the industry average. With access to your gateway, payment processor and sales system (CRM), we can integrate seamlessly and analyze your chargeback data and root causes in real-time, while maintaining the strictest security compliance to keep your data safe. The #1 provider of dispute analytics and Smart Chargeback Recovery; our alerts, Root-Cause Analyzer™ & 3D Secure technologies empower you to eliminate ~50% of chargebacks. Real-time chargeback source identification tells you more about your buyer's journey than any existing dispute tool or service. Root-Cause Analyzer allows you to assess 40+ data points, identify vulnerabilities, increase retention and boost customer satisfaction.
  • Previous
  • You're on page 1
  • Next