Alternatives to SDS IronSphere
Compare SDS IronSphere alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to SDS IronSphere in 2026. Compare features, ratings, user reviews, pricing, and more from SDS IronSphere competitors and alternatives in order to make an informed decision for your business.
-
1
BMC Compuware Application Audit
BMC Software
BMC Compuware Application Audit enables security and compliance teams to easily capture start-to-finish mainframe user behavior in real time, including all successful logins, session keyboard commands and menu selections, and specific data viewed without making any changes to mainframe applications. Application Audit enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Get deep insight into user behavior including data viewed, by whom, and which applications were used to access it. Deliver the granular intelligence and reporting needed to comply with regulations such as HIPAA, GDPR, the Australian NDB scheme, as well as company security policies. Separate the system administrator’s duties from the responsibilities of auditors with a web UI, so that no single person is in a position to engage in malicious activities without detection. -
2
CA Cleanup
Broadcom
Easily automate continuous and unattended security file cleanup. CA Cleanup is designed to help you comply with many regulations and laws requiring due diligence for information security, protection and privacy. Mainframe security databases accumulate obsolete user IDs and entitlement definitions which may be valid but not appropriate for an individual’s role. This creates uncertainty, risk and greater potential for security exposure. It also creates an unnecessary burden for administrators and the system. More so, increasing regulatory, statutory, audit and staffing pressures are bringing new concerns and mandates to address the problem of excessive security entitlements. This is why CA Cleanup is needed. Executes continuously, monitoring your security system activity to record the actual security definitions that the system is or is not using. Monitors security activity and can identify used and unused access for any user or application. -
3
Rocket z/Assure VAP
Rocket Software
Rocket z/Assure Vulnerability Analysis Program (VAP) is a specialized mainframe security solution that scans and analyzes vulnerabilities in IBM z/OS operating system code to help organizations identify, assess, track, and mitigate security risks that could expose critical data. Unlike traditional vulnerability tools that focus on application layers, z/Assure VAP conducts thorough and precise binary code scanning at the OS level to detect zero-day and integrity-based vulnerabilities without relying on signature files, using an Interactive Application Security Testing (IAST)-style approach to pinpoint real weaknesses and guide developers to the exact code requiring remediation. It generates detailed vulnerability disclosure reports that provide actionable insights and clear paths to fix issues, enabling teams to prioritize risk, strengthen defenses, and make mainframe vulnerability management a repeatable part of IT security and compliance programs. -
4
Security Insights Platform helps ensure a trusted environment for your customers and employees by easily identifying and reducing risk from threats. It can quickly interpret and assess the security posture of your Mainframe. And, for risky findings, it helps develop remediation steps –all on an ongoing and ad hoc basis. Security Insights offers a foundation that enables your Mainframe to connect with your network and hybrid cloud across your enterprise. It enables you to securely deliver vital support for digital transformation. And, CA Security Insights output integrates with additional in-house tools such as SOC and SIEMs to provide a single, enterprise-wide view of your security posture. Collect, aggregate, and analyze security data to help remediate mainframe security risk. Eliminate manual, resource intensive, and time consuming data collection. Automate the heavy lifting.
-
5
Top Secret
Broadcom
The success of today’s business strategies depends on a reliable, comprehensive, and cost-effective security infrastructure. Businesses need access to their mainframe databases but without the stress of security concerns. Consumers will only trust businesses that protect their personal information. Top Secret provides comprehensive security for your valuable information assets, enabling your business to fully realize the mainframe's reliability, scalability, and efficiency. Get out-of-the-box identity and access management, logging, and audit reporting. Get comprehensive cybersecurity for your valuable information assets, enabling your business to fully realize the mainframe's reliability, scalability, and cost-effectiveness. Get a flexible configuration mechanism that monitors and adjusts your security policies and accommodates virtually all organizational structures. -
6
SDS E-Business Server
Software Diversified Services
SDS is now distributing, supporting, and actively developing new features for the proven E-Business Server, the authentic OpenPGP encryption tool originally developed by cryptography pioneer Phil Zimmerman. Using OpenPGP encryption technology and versatile APIs, SDS E-Business Server offers strong encryption that integrates with the widest range of applications and platforms, including the mainframe. E-Business Server is designed for companies that require the highest levels of protection for data stored internally, transmitted within the organization, and distributed beyond its firewalls. Today’s data security mandates are complex but critical. Gain compliance with GDPR and other required standards with unbreakable signature creation and reliable authentication. E-Business Server dramatically reduces file sizes, bandwidth consumption, processing time, and disk space to keep resources under control. -
7
ACF2
Broadcom
Reliable, scalable security and streamlined administration for your mainframe. The success of businesses today depends on a reliable, comprehensive, and efficient security infrastructure. Businesses need access to their mainframe databases but without the stress of security concerns. And consumers only trust businesses that protect their personal information. ACF2 provides comprehensive security for your valuable information assets, enabling your business to fully realize the mainframe's reliability, scalability, and cost-effectiveness. ACF2 Supports multi-factor advanced authentication with ACF2 for z/OS and, with ACF2 for Db2 for z/OS, provides the ability to externalize security for IBM Db2 without the need for an exit. Out-of-the-box identity and access management, logging, and audit reporting. Provides complete cybersecurity for your valuable information assets, enabling your business to fully realize the mainframe's reliability, scalability, and cost-effectiveness. -
8
Mainframe systems are the foundation of trusted digital experiences for most of the world’s largest companies and organizations. However, passwords protecting critical users, data, and applications are a relatively simple point of attack for hackers to exploit because the passwords rely on user education and compliance for both implementation and control. By using a variety of methods, such as social engineering and phishing, criminals have exploited employees, partners, and general users to hack into even the most secure platforms. IBM Z MFA raises the level of assurance of your mission-critical systems with expanded authentication capabilities and options for a comprehensive, user-centered strategy that helps mitigate the risk of compromised passwords and system hacks. Our designers are also IBM Z MFA users. Across every new version, we incorporate their growing knowledge and expertise in real-world mainframe security scenarios.
-
9
SDS VitalSigns
Software Diversified Services
Every product in the VitalSigns family is a money saver. Each VitalSigns product provides a quick install, an economical alternative to costly legacy products, minimal demand on the mainframe, and 24/7 access to our world-class support team. VitalSigns is a full-spectrum tool set for… Event Log Management and Compliance – VitalSigns SIEM Agent for z/OS FTP Monitoring – VitalSigns for FTP Complete FTP Security – The VFTP/SSH Collaboration IP Monitoring – VitalSigns for IP Network Automation – VitalSigns for Network Automation and Control SNA and IP Monitoring – VitalSigns for VTAM -
10
IBM RACF for z/OS enables the protection of your mainframe resources by making access control decisions through resource managers. Granting access to only authorized users keeps your data safe and secure. RACF authenticates users with a password, password phrase, digital certificate, Kerberos ticket, or a PassTicket. Protect your mainframe resources with tools that manage and control access to valuable z/OS data. RACF retains information about your users, resources, and access authorities in its database. This database determines access to protected mainframe system resources based on your security policy. RACF has logging and reporting functions that identify users who attempt to access the resource, either successfully or unsuccessfully. Detection of security exposures or threats is made possible by this feature. Through the RRSF, you have the capability to run most RACF commands on a node and a user ID different from the one you are logged on to.
-
11
CA Auditor for z/OS
Broadcom
With each new generation of computers, operating systems become more complex. These complexities have made auditing the operating systems more time consuming and difficult. Any operating system, even the mainframe, can be subject to security exposures due to errors in installation, customizations, and/or product bugs and maintenance. CA Auditor is a comprehensive software package that can perform an automated technical review of the system, hardware and software environment and identify integrity exposures. Identifies potential areas of security risk and exposure from improperly configured implementations. Capability to perform a high-level look at the operating system and components. Provides the capability to monitor usage and ensure the integrity of your system files. CA Auditor addresses a significant exposure point in the z/OS operating system by empowering you to perform comprehensive auditing, integrity checks, and verifications. -
12
Precisely Ironstream
Precisely
Integrate mainframe and IBM i systems into leading IT analytics and operations platforms for an enterprise-wide view to support your digital business. In today’s digital, always-on world, IT is arguably the most important department across your organization. A single security breach or service outage can bring your business to a standstill. But knowing what’s happening across an increasingly complex landscape of infrastructure and apps, and resolving issues before they impact the business, is a daunting task. The good news is that there are several platforms to help you monitor IT security and operations across the enterprise in real-time, and take action fast. The challenge, however, is that mainframe or IBM i systems aren’t natively supported by these modern tools. So, if you rely on these critical servers to run your business and you’re managing them in isolation, you have a dangerous blind spot. -
13
TPX Session Management for z/OS
Broadcom
Support the unique organizational specifications and session manager requirements within an enterprise. TPX Session Management for z/OS solves the problem of repeatedly logging in and out of your various applications connected to a VTAM network by enabling you to securely access and navigate between all the applications from a single menu. Securely grants authenticated access to dynamically built application menus. Supports multiple departmentalized requirements through customization of different users. Delivers enhanced performance and usability through data compression, simplified administration, and a single point of control, enabling commands and responses to be passed between instances. Transform your company and build your career with Broadcom training, certifications, and resources. Your hub for creating seamless integrations that tap into the full capabilities of mainframe services. -
14
Trusted Access Manager for Z
Broadcom
Reduce the risk of insider threats, from malicious attacks to inadvertent threats. Trusted Access Manager for Z helps deliver trusted systems and improve business efficiency through comprehensive privileged access management for your mainframe. By eliminating the need for shared credentials, working with existing tools, and producing forensics on all privileged user activity, you stay in complete control over vital mainframe data. Restrict users who have access to a privileged state and timebox the elevation duration to reduce the risk of insider threats. Simplify auditing by eliminating privileged credential sharing and maintaining a complete line of sight into individual privileged user activities. Maintain complete control of when users have access to the most sensitive data in the business, to deliver trusted systems and operate efficiently. Transform your company and build your career with Broadcom training, certifications, and resources. -
15
CA Compliance Event Manager
Broadcom
Non-compliance can result in out-of-control costs and a serious impact to the bottom line. CA Compliance Event Manager helps you establish continuous data security and compliance. Gain deeper insight into your enterprise’s risk posture, protect your business, and comply with the regulations using advanced compliance management tooling. Monitor users, security settings, and system files and alert to changes and suspicious activity for complete oversight of your security systems and data. Get real-time notifications to proactively address potential threats. Filter critical security events and forward to SIEM platforms for a holistic view of your security infrastructure. Reduce costs by minimizing the number of security alerts undergoing real-time analysis. Inspect the source of incident with detailed audit and compliance information for deeper insights into your risk posture. -
16
CloudMatos
CloudMatos
MatosSphere brings a complete cloud compliance solution for your cloud infrastructure. Our cloud compliance solution provides you with the tools you need to secure your cloud environment and meet compliances. With our self-healing, self-secure and intelligent remediation, MatosSphere is the only cloud compliance and security platform you need to keep your cloud infrastructure safe and compliant. Contact us today to learn more about our cloud security and compliance solutions. Cloud security and compliance governance can be major challenges for customers with growing cloud adoption. As more companies migrate their workloads to public cloud environments, they may find it difficult to provision, manage and maintain secured, compliant and scalable infrastructure. The cloud resource footprint can evolve and increase quickly, making it difficult to have a business continuity plan in place.Starting Price: $500 per month -
17
BMC AMI Security
BMC Software
Suspicious and known malicious actions are automatically halted before your systems are compromised. Real-time visibility for security responders and your operations team to rapidly close the window of opportunity for attackers. Data is correlated across multiple systems and translated into common security terms for clarity and context. Out-of-the-box scorecards help improve adherence to HIPAA, PCI DSS, and GDPR. Automated security scans tailored by security experts uncover and halt threats before a compromise occurs. Reports crafted by experts help you address risks by informing you of threat events, suspicious activity and regulatory compliance risks. Policy scanning based on real-world penetration tests uncovers configuration vulnerabilities before they are exploited. -
18
Continuous delivery of any application to any environment. IBM DevOps Deploy (formerly IBM UrbanCode Deploy) is an application-release solution that combines continuous delivery and deployment automation with robust visibility, traceability and auditing capabilities. Increase frequency of software delivery through automated, repeatable deployment processes across development, testing and production. Simplify the deployment of multichannel applications to all environments, whether on premises or in the cloud, with consistency and repeatability. Use a single centralized server to manage tens of thousands of endpoints to any number of clouds, data centers or mainframes. Make processes more robust and easier to design by using tested integrations with dozens of tools and technologies, including Jira, Jenkins, Kubernetes, Microsoft, ServiceNow and WebSphere.
-
19
IBM OMEGAMON
IBM
Gain real-time and historical performance management of IBM Z® mainframe and middleware subsystems, plus reduce blind spots in your multicloud environments. Integrate OMEGAMON monitoring with IBM System Automation, Netview, and asset management for your z/OS® enterprise. Optimize performance and availability of vital IMS systems and enable operators to manage IMS from a single console. Monitor key IBM MQ and IBM Integration Bus deployments to ensure that system operations avoid bottlenecks and performance issues. Monitor WebSphere Application Servers on z/OS with in-depth diagnostic information on application performance.Gain a foundation for z/OS resource monitoring and visibility into operating system and subsystem performance. -
20
Tape Encryption
Broadcom
Designed to be an innovative, flexible, easily implemented, and comprehensive z/OS tape encryption solution. It helps ensure that your data is protected from breaches, even if your tapes fall into the wrong hands. Tape Encryption helps you safeguard your sensitive data and automate full lifecycle key management. And it can be implemented without the need to purchase expensive and complex hardware. With this mainframe solution, you can take steps to shield your company from fines, costly corrective processes, and the negative publicity that can occur when personal and business-critical data are compromised. Tape Encryption helps you implement your security strategy while containing costs. Protect against data breaches and the inherent potential for loss of revenue and negative press. Offers an automated solution to key management that exploits other Broadcom facilities to deliver optimum performance and limit processor overhead. -
21
zSecure Admin
IBM
zSecure Admin enables you to automate time-consuming IT security management tasks by quickly identifying, analyzing, and preventing problems in IBM RACF. You can also monitor privileged users to help ensure old accounts are properly deleted and products have been integrated appropriately. zSecure Admin integrates smoothly with zSecure Audit for end-to-end monitoring and remediation. zSecure Admin can administer multiple systems with a single application interface. You can compare profiles, efficiently merge security rules from different databases, or rename IDs within the same database. When merging profiles from different databases, zSecure Admin performs extensive consistency checks and reports potential conflicts before generating commands, helping ease the burden of consolidation efforts ad compliance automation. -
22
Time Machine
Solution-Soft
Time Machine® provides software virtual clocks that enable you to time travel your applications into the future or the past, facilitating time shift testing on your date and time-sensitive application logic, such as month-end, quarter-end, year-end processing, billing cycle, workflow, regulatory go live and policy life cycle. Time Machine is transparent to applications and databases so no code modification is required to do time shift testing and the system clock is never modified. Time Machine eliminates the need to reset the system clock, which is time-consuming, error-prone, and not possible under Active Directory or in a Kerberos secured environment. Mitigate risks for mission-critical application failures. Ensure large-scale software projects finish on time and under budget. Windows, Linux, Unix, Mainframe zLinux, Dockerized, Virtualized, On-Iron, or in the Cloud. Time Machine runs everywhere you need it. -
23
SRWare Iron
SRWare
Download the best browser in the world. Renowned for privacy and security. Free! For Windows, Android, Linux and Mac. Nobody likes bloatware. We provide you a clean peace of software which only installs and does what you want. SRWare is the only browser which can be totally "quiet"! That means, your private sphere will stay private! You only give that informations away from which you really want it. With the Blink rendering engine and many further optimizations we can provide you one of the fastest browsing experinences in the world. Chrome thrilled with an extremely fast site rendering, a sleek design and innovative features. But it also gets critic from data protection specialists , for reasons such as creating a unique user ID or the submission of entries to Google to generate suggestions. SRWare Iron is a real alternative. The browser is based on the Chromium-source and offers the same features as Chrome, but without the critical points that the privacy concern. -
24
IronDefense
IronNet Cybersecurity
IronDefense: Your gateway to network detection and response. IronDefense is the industry’s most advanced network detection and response (NDR) platform built to stop the most sophisticated cyber threats. Gain unparalleled visibility. Empower your entire team. Make faster, smarter decisions. As an advanced NDR tool, IronDefense improves visibility across the threat landscape while amplifying detection efficacy within your network environment. As a result, your SOC team can be more efficient and effective with existing cyber defense tools, resources, and analyst capacity. Real-time insights across industry threatscapes, human insights to detect threats, and higher-order analysis of anomalies correlated across groups of peers via IronDome Collective Defense integration. Advanced automation to apply response playbooks built by the nation's top defenders to prioritize detected alerts by risk and supplement limited cyber staff. -
25
IronDome
IronNet Cybersecurity
IronDome: Your window to the threat landscape. IronDome is the first automated cyber Collective Defense solution that delivers threat knowledge and intelligence across industries at machine speed. With IronDome, your organization can collaborate with others across industries and sectors to stay ahead of evolving threats through real-time threat sharing. Cyber threats are evolving exponentially. Attacks are evolving faster than most organizations can manage alone. We founded IronNet to change the way organizations think about security, building a broad coalition that can collaboratively work together to stay ahead of threats and threat actors. The IronDome solution facilitates Collective Defense to deliver the unique ability to automate real-time knowledge sharing and collaboration between and beyond sectors for faster threat detection. Now, you can build a stronger cyber defense that can scale over time by anonymously collaborating with others in real time. -
26
IronFX
IronFX
IronFX is a leading international brokerage operating as the trade name of Notesco Limited. The global online forex broker has been recognised internationally with more than 40 prestigious industry awards. IronFX has grown exponentially, and it currently has more than 1.5 million traders across 180 countries worldwide! 🚀 It provides secure and reliable access to financial markets through its cutting-edge trading platforms, including the industry standard MetaTrader 4, WebTrader, IronFX mobile trading app, IronFX Web Trader app, and TradeCopier.Traders can also enjoy fast and reliable execution with VPS Hosting. A PMAM platform for managing multiple accounts is also available and is ideal for account managers. -
27
UKM Universal SSH Key Manager
Software Diversified Services
UKM discovers, remediates, and manages SSH user keys without interrupting business systems or impeding workflow. UKM finds and tracks existing keys, verifies trusted connections, renews authorizations, and removes inactive keys as needed. No changes to processes, no guessing about compliance. And it cuts costs along the way. UKM is the solution for any size business that is concerned about managing and safeguarding the secure shell environment. UKM automatically traces SSH key usage and updates authorizations while detecting and removing potentially dangerous, unused keys. All without disrupting operations. Eliminate all the overhead costs related to SSH keys by centralizing oversight and automating administration. Savings can reach millions of dollars per year. While SSH is the gold standard for securing data transfers, improperly managed SSH keys represent a significant security risk. UKM solves this issue and assures compliance. -
28
The IBM® zSecure Suite adds layers of security assurance, including audits, alerts, administration, reporting and authentication, that enhance the security and risk management in IBM Z® hardware, software, virtualization, and standard external security managers (ESMs) such as IBM RACF, CA ACF2, and CA Top Secret. The zSecure Suite automates security administrative tasks to help increase efficiency and reduce errors, detects internal and external threats, issues real-time alerts, and monitors compliance. Automates security administrative tasks to help increase efficiency and reduce errors. Effective identity governance can help enforce compliance management of regulations and standards. Detect threats, issue real-time alerts, and monitory compliance such as pervasive encryption utilization for GDPR. Secure strong authentication to strengthen user controls with integration for easy administration.
-
29
Crypto Analytics Tool (CAT) collects security-relevant information and helps build your cryptographic inventory. Through the graphical client, it is easy to analyze security information. Enterprise-wide overview of all z/OS cryptographic consuming LPARs from a single CAT monitor client. Offers a comprehensive data view of the cryptographic security of the system. Allows monitoring to ensure that keys and cryptographic functions are set up and protected, complying with best practices. Eases policy and compliance enforcement. Helps administrators understand weaknesses and gaps to prioritize improvements. Comprehensive overview of the cryptographic security of HSM, ICSF, and RACF of the system. Key data for better policy and compliance enforcement. Identify insecure keys and algorithms. Comparison of the current crypto state with the previous snapshot for error and problem determination or change control validation.
-
30
LifeSphere NavaX
ArisGlobal
LifeSphere NavaX is your gateway to a future where advanced automation, AI, and intelligent data analytics converge to revolutionize your business and drive better end-to-end outcomes. LifeSphere NavaX is designed with scalability and customization in mind. We partner with you to map your automation journey based on your objectives, goals, and timeline. Stay in control with the ability to activate or deactivate features as needed. LifeSphere NavaX enhances LifeSphere solutions, seamlessly integrating with third-party systems to ensure a smooth transition to a more intelligently automated future. LifeSphere NavaX is developed in collaboration with pharmaceutical and regulatory leaders, maintaining the highest levels of quality and security through robust governance frameworks and compliance standards. Automate routine manual workflows and processes for unmatched end-to-end time and cost savings, including up to 50% efficiency gains on key workflows. -
31
NiCE VMware Management Pack
NiCE IT Management Solutions GmbH
Next-Level VMware Monitoring on Microsoft SCOM Virtualization with VMware not only makes IT operations more efficient, flexible, and cost-effective, but also more complex. How can you ensure that your virtual environments run at peak performance, remain highly available, and stay secure? The NiCE VMware vSphere Management Pack 6.1 is a comprehensive and intuitive System Center extension for managing your VMware vSphere and vSAN environments. With high-performance, agentless monitoring, near real-time discovery of VMware changes, and built-in compliance and security checks, it gives you full transparency beyond the virtualization layer. Monitor VM and datastore performance, ESXi configuration, snapshots, DRS, and more — all with native SCOM integration, high availability, and automated configuration via VMware’s latest REST API. With vSphere MP 6.1, you can unleash the full potential of your virtual infrastructure while staying firmly in the familiar SCOM ecosystem. -
32
IronPython
IronPython
IronPython is an open-source implementation of the Python programming language which is tightly integrated with .NET. IronPython can use .NET and Python libraries, and other .NET languages can use Python code just as easily. Experience a more interactive .NET and Python development experience with Python Tools for Visual Studio. IronPython is an excellent addition to .NET, providing Python developers with the power of the .NET. Existing .NET developers can also use IronPython as a fast and expressive scripting language for embedding, testing, or writing a new application from scratch. The CLR is a great platform for creating programming languages, and the DLR makes it all the better for dynamic languages. Also, the .NET (base class library, presentation foundation, etc.) gives developers an amazing amount of functionality and power. IronPython uses Python syntax and standard libraries and so your Python code will need to be updated accordingly.Starting Price: Free -
33
The IronNet Collective Defense Platform leverages advanced AI-driven Network Detection and Response (NDR) capabilities to detect and prioritize anomalous activity inside individual enterprise network environments. The platform analyzes threat detections across the community to identify broad attack patterns and provides anonymized intelligence back to all community members in real-time, giving all members early insight into potential incoming attacks. By collaborating in real-time, companies and organizations across sectors can defend industries better, together, by seeing and fighting the same threats. When organizations collaborate to detect, share intelligence, and stop threats together in real time, they form a collective defense community. Discover how IronNet's Collective Defense platform, built on our IronDome and IronDefense products, enables organizations to realize the full benefits of this approach.
-
34
ibi Open Data Hub for Mainframe
Cloud Software Group
ibi Open Data Hub for Mainframe provides real-time access to mainframe data, enabling seamless integration with various business intelligence tools. By allowing data to remain on the mainframe, it ensures compliance with security protocols and regulatory standards. The platform reduces the need for custom SQL queries, enhancing productivity and facilitating prompt, informed decision-making. Utilizing zIIP specialty engines, it offers cost-effective data access by offloading workloads from general-purpose processors. This solution empowers organizations to respond swiftly to market trends and customer demands by providing comprehensive, up-to-date business data. Reduce the time to gain access to data by eliminating the need for custom SQL queries so you can retrieve and analyze information faster to ensure faster decision-making. Access the data from the mainframe in real time to develop insights that let you make informed decisions promptly. -
35
InSight Digital Experience Platform
Iron Mountain
Iron Mountain InSight Digital Experience Platform (DXP) is a secure, scalable SaaS solution designed to automate and enhance the management of both digital and physical information throughout its lifecycle. It integrates intelligent document processing (IDP), content management, workflow automation, and information governance into a unified environment, facilitating digital transformation initiatives. InSight DXP employs advanced AI technologies, including generative and agentic AI, to extract, classify, and enrich unstructured data, enabling rapid document understanding and intelligent decision-making. Users can create custom workflows and solutions using the platform's low-code Solution Designer, which offers pre-built templates and connectors for various business applications. Additionally, InSight DXP supports compliance by enforcing records retention and data privacy policies, integrating with the Iron Mountain Policy Center solution to ensure audit-ready governance. -
36
LifeSphere Medical Affairs
ArisGlobal
LifeSphere Medical Affairs is a cloud-based platform developed by ArisGlobal to enhance efficiency, compliance, and collaboration within medical affairs teams. It offers a unified workspace that seamlessly integrates medical information management with safety and quality systems, enabling end-to-end automation and real-time data sharing. The platform streamlines the intake and management of medical inquiries across multiple channels, automates the processing of product complaints and adverse events, and ensures consistent global compliance with evolving regulatory requirements. Its advanced analytics and reporting tools provide actionable insights, facilitating data-driven decision-making and improved patient outcomes. LifeSphere Medical Affairs is designed to be scalable and configurable, catering to the unique needs of organizations of all sizes. -
37
H-Sphere
Positive Software
H-Sphere is a scalable multiserver web hosting solution. It has many advanced features and a sophisticated billing system to automate and improve your web hosting tasks. H-Sphere was designed to work on many servers and can be scaled by adding more web, mail, database, and DNS servers without any downtime. It provides a simple, easy-to-use web interface that can be maintained from any computer with an internet connection. H-Sphere was written in Java and works with any SQL-compliant database. It runs only industry-standard software. H-Sphere follows a true centralized model to allow the highest level of manageability. The data is stored in the centralized database. Control panel server dispatches command (using ssh or http protocols) to different servers. New servers can be added on the fly. The control panel server manages all new machines, users, domains, and events behind the scene.Starting Price: $4.50 one-time payment -
38
CloudSphere
CloudSphere
CloudSphere is a cloud governance platform. CloudSphere provides governance across migration planning, security posture, identity, compliance and cost management in the cloud. We are the only cloud management platform that collects the key data points that together define applications in cloud environments and correlates them to enable governance at the application level. Our solutions include cloud migration planning, cloud cost management and cloud security posture management. The most advanced agentless application discovery and dependency mapping solution for migrating complex apps. The only governance platform with Application Intelligence that allows you to manage migration, cost and security on a per application basis in the cloud. A single platform and user experience for cloud planning and governance across all cloud providers dramatically reduces the number of tools required. -
39
CENTUM CS
Yokogawa
With the actual implementations in many plants and absolutely high reliability, CENTUM CS has been the best seller of large-scale DCS since its first sale in 1993. Since it was released in 1993, CENTUM CS is widely applied in the plants of oil refinery, petrochemical, chemistry, iron and steel, non-ferrous metal, metal, cement, paper pulp, food and pharmaceutical industries, and power, gas and water supply as well as many other public utilities. The excellent operability and engineering technique, and the high reliability proved by the abundant actual application results, guaranteed that the CENTUM CS will continue to play an important role in the 21st century. -
40
IronWallet
IronWallet
IronWallet is a secure, non-custodial cold crypto wallet designed for users seeking full control over their digital assets. It supports over 10,000 cryptocurrencies, including Bitcoin, Ethereum, Binance Coin, Solana, and Polygon, allowing users to manage diverse portfolios within a single app. It emphasizes privacy and security by eliminating the need for registration or KYC verification, ensuring that only users have access to their private keys. A standout feature is the optional NFC card, which securely stores the seed phrase offline, providing a safer alternative to traditional paper backups and enabling wallet restoration if the app is deleted or the phone is lost. IronWallet offers unlimited wallet creation, biometric and PIN protection, and a user-friendly interface for seamless crypto management. It also integrates with decentralized applications via WalletConnect, enhancing its functionality for various blockchain interactions.Starting Price: Free -
41
IronCore Labs
IronCore Labs
IronCore's SaaS Shield is a platform for managing Application-Layer Encryption in cloud software applications. It manages all of the concerns of such a system from key orchestration to rotation to audit trails. And it supports multi-tenant setups and BYOK/HYOK needs. Together with IronCore's other products, meaningfully protected data can still be usable and it can be searched over with Cloaked Search and Cloaked AI.Starting Price: $299/tenant -
42
WebSphere Hybrid Edition is a flexible, all-in-one solution for WebSphere application server deployments that can enable organizations to meet current and future requirements. It will enable you to optimize your existing WebSphere entitlements, modernize your applications, and build new cloud-native Java EE applications. An all-in-one solution to help you run, modernize and create new Java applications. Use IBM Cloud® Transformation Advisor and IBM Mono2Micro to help assess the cloud readiness of your applications, explore options for containerization and microservices, and get assistance in adapting code. Explore and unlock the benefits of the all-in-one IBM WebSphere Hybrid Edition solution for your application run time and modernization features. Identify which WebSphere applications can easily move to containers for immediate savings. Manage costs, enhancements, and security proactively throughout the application lifecycle.
-
43
IBM® WebSphere Commerce is an on-premise e-Commerce platform that empowers B2C and B2B organizations to rapidly innovate and drive their omnichannel businesses. In version 9.0, WebSphere Commerce adopted containerization to provide businesses more flexibility and resiliency for their e-Commerce sites. You can now leverage IBM Cloud Private to easily install, deploy, and operate your WebSphere Commerce environments. Beginning with release 9.0.1.1, WebSphere Commerce is certified with the IBM Cloud Pak badge. This badge ensures that WebSphere Commerce meets the enhanced enterprise-grade criteria for security, integration, and workload availability.
-
44
Azure Sphere
Microsoft
Azure Sphere is a secured IoT platform for building solutions that start in silicon and extend through the OS and the cloud. Securely connect, manage, and protect new and existing intelligent devices. Protect your device, data, and infrastructure on all fronts—hardware, software, and in the cloud. Trust that your data estate is secured with an end-to-end IoT security solution to connect existing equipment and create new IoT devices. Connect your existing devices to the cloud with Azure Sphere certified guardian modules or get started embedding Azure Sphere into new devices with the development kit. Respond to emerging threats and new requirements with real-time security patches, OS updates, and improvements to your application. Every Azure Sphere instance comes with more than 10 years of Microsoft security services that include managed updates. When you're ready, deploy over-the-air (OTA) updates alongside your application directly to the IoT device. -
45
VFI
21st Century Software
VFI delivers high-value management of batch applications leveraging analytics and automated process, reducing dependency on domain experts and time-consuming resources. It provides end to end operational resiliency and reduction of business risk for mainframe batch application data by providing immediate insight into data inter-dependencies and vulnerabilities. The robust feature set is built on a foundation of near real-time collection and analysis of SMF data. Analysis of data usage patterns and a comprehensive inventory of curated information enables quick, automated recovery of mainframe batch data for operational use or disaster recovery events without reliance on application expertise. VFI delivers a comprehensive inventory of mainframe batch data usage and backups, and a means to automate backups as well as quickly recover data. The end-to-end, integrated solution for mainframe batch data manages all of the application elements to ensure SLA compliance and availability. -
46
HCL Z Asset Optimizer (ZAO)
HCL Software
Don’t weigh down your Z System with outdated and unused software - Realize the return of investment of your Mainframe systems by enabling continuous innovation and speed with the software assets your organization needs most by implementing a robust IT asset management program. Optimize software cost, simplify asset management tasks, and comply with software vendor audits easily. ZAO creates an accurate inventory of software assets on each mainframe system by a batch job that discovers loadable programs in zOS® data sets and z/OS UNIX Systems Services file systems. The usage of each asset is monitored and reported so that you will have an accurate view of software asset usage. ZAO enables you to enter license information about your vendor software assets. The license information is compared against their inventory and usage on your mainframe systems to identify opportunities for optimization and audit exposures. -
47
ironSource
ironSource
Everything you need for game growth. ironSource builds technologies that help game developers take their games to the next level, including the industry’s largest in-app video ad network, a robust mobile ad mediation platform, and a data-driven user acquisition platform. The biggest game developers in the industry trust ironSource with their businesses because we provide everything they need for growth in one powerful platform. -
48
IronCAD
IronCAD
IronCAD significantly reduces manufacturing barriers and increases engineering productivity with intuitive 3D and 2D solutions for rapid design and seamless collaboration enterprise-wide. Create design iterations, proposals, and production drawings in less time and simply design faster than any other CAD system available today. What makes us different? IronCAD lets you design intuitively in the way you interact in the world, in 3D. With this easier and faster design approach over traditional CAD software, it’s a fundamentally better way to design. IronCAD gives you the speed to invent the future, with time left to watch it unfold. Skip repetitive steps so you can get to market faster, ahead of your competitors, and with far more return on your investment. -
49
IronFunctions
Iron.io
IronFunctions is an open source serverless platform, also known as a Functions-as-a-Service (FaaS) platform, that allows developers to write functions in any language and deploy them across various environments, including public, private, and hybrid clouds. It supports AWS Lambda function formats, enabling seamless import and execution of existing Lambda functions. Designed for both developers and operators, IronFunctions simplifies coding by allowing the creation of small, focused functions without the need to manage the underlying infrastructure. Operators benefit from efficient resource utilization, as functions consume resources only during execution, and the platform's scalability is managed by adding more IronFunctions nodes as needed. It is built using Go and leverages container technologies to handle incoming workloads by spinning up new containers, processing the payloads, and returning responses.Starting Price: Free -
50
The IBM z/OS Authorized Code Scanner (zACS) is a priced feature of z/OS version 2 release 4 and above to help support clients in their efforts to strengthen the security posture of the z/OS. The scanner searches for potential vulnerabilities within the Authorized Program Facility (APF) code libraries. Basic & advanced levels of testing for PCs & SVCs. AC(1) parameter testing for batch and USS environments. Visual z/OSMF experience providing diagnostics for remediation. Feeds off z/OS recovery processing non-invasively. Designed to run on production systems. Can automatically capture dumps for problem analysis.