Business Software for HP-UX

  • 1
    Pandora FMS Reviews
    Top Pick
    With more than 50,000 customer installations across the five continents, Pandora FMS is a truly all-in-one monitoring solution, covering all traditional silos for specific monitoring: servers, networks, applications, logs, synthetic/transactional, remote control, inventory, etc. Pandora FMS allows you to quickly find and solve problems. It scales them so that they can be derived either from on-premise, multi-cloud, or both. You now have the ability to use your entire IT stack and analytics to solve any problem, even those that are difficult to find. You can control and manage any technology and application with more than 500 plugins, including SAP, Oracle, Lotus or Citrix, Jboss, VMware, AWS and SQL Server.
  • 2
    Veeam Kasten for Kubernetes Reviews
    Trusted by the world’s largest organizations, Veeam Kasten delivers secure, Kubernetes-native data protection and application mobility for the most complete set of distributions and platforms at enterprise scale. We give operations and application teams the confidence to withstand the unexpected and deliver faster, all without complex scripting, unsupported tools, and legacy solutions.
  • 3
    IRI CoSort Reviews

    IRI CoSort

    IRI, The CoSort Company

    $4,000 perpetual use
    For more four decades, IRI CoSort has defined the state-of-the-art in big data sorting and transformation technology. From advanced algorithms to automatic memory management, and from multi-core exploitation to I/O optimization, there is no more proven performer for production data processing than CoSort. CoSort was the first commercial sort package developed for open systems: CP/M in 1980, MS-DOS in 1982, Unix in 1985, and Windows in 1995. Repeatedly reported to be the fastest commercial-grade sort product for Unix. CoSort was also judged by PC Week to be the "top performing" sort on Windows. CoSort was released for CP/M in 1978, DOS in 1980, Unix in the mid-eighties, and Windows in the early nineties, and received a readership award from DM Review magazine in 2000. CoSort was first designed as a file sorting utility, and added interfaces to replace or convert sort program parameters used in IBM DataStage, Informatica, MF COBOL, JCL, NATURAL, SAS, and SyncSort. In 1992, CoSort added related manipulation functions through a control language interface based on VMS sort utility syntax, which evolved through the years to handle structured data integration and staging for flat files and RDBs, and multiple spinoff products.
  • 4
    IRI FieldShield Reviews

    IRI FieldShield

    IRI, The CoSort Company

    IRI FieldShield® is a powerful and affordable data discovery and de-identification package for masking PII, PHI, PAN and other sensitive data in structured and semi-structured sources. Front-ended in a free Eclipse-based design environment, FieldShield jobs classify, profile, scan, and de-identify data at rest (static masking). Use the FieldShield SDK or proxy-based application to secure data in motion (dynamic data masking). The usual method for masking RDB and other flat files (CSV, Excel, LDIF, COBOL, etc.) is to classify it centrally, search for it globally, and automatically mask it in a consistent way using encryption, pseudonymization, redaction or other functions to preserve realism and referential integrity in production or test environments. Use FieldShield to make test data, nullify breaches, or comply with GDPR. HIPAA. PCI, PDPA, PCI-DSS and other laws. Audit through machine- and human-readable search reports, job logs and re-ID risks scores. Optionally mask data when you map it; FieldShield functions can also run in IRI Voracity ETL and federation, migration, replication, subsetting, and analytic jobs. To mask DB clones run FieldShield in Windocks, Actifio or Commvault. Call it from CI/CD pipelines and apps.
  • 5
    IRI DMaaS Reviews

    IRI DMaaS

    IRI, The CoSort Company

    $1000 per day
    IRI Data Masking as a Service is a professional services engagement to secure PII. Step 1: IRI agrees under NDA terms to classify, analyze, and report on the sensitive, at-risk data in your sources. We will discuss an initial cost estimate then hone it with you during data discovery. Step 2: Transfer the unprotected data to a secure on-premise or cloud-based staging area or provide remote, supervised access to IRI to the data sources(s) at issue. We'll use the tools in the award-winning IRI Data Protector suite to mask that data according to your business rules, on an ad hoc or recurring basis. Step 3: Our experts can also move newly-masked data to incremental replicas in production or to lower non-production environments. From either, the data is now safe for analytic initiatives, development, testing, or training. Tell us if you need additional services, like re-ID risk scoring (expert determination) of the de-identified data. This approach provides the benefits of proven data masking solution technology and services without the need to learn and customize new software from scratch. If you do want to use the software in-house, you will have everything pre-configured for easier long-term self-use and modification.
  • 6
    Oracle Data Guard Reviews

    Oracle Data Guard

    Oracle

    $46 per user per year
    Oracle Data Guard is designed to provide high availability, protect data, and facilitate disaster recovery for enterprise-level information systems. It offers a robust array of services aimed at creating, managing, and overseeing one or more standby databases, ensuring that production Oracle databases can withstand disasters and prevent data corruption. The platform includes management and monitoring tools that automate the creation and upkeep of synchronized copies of a primary database, thus safeguarding Oracle data against failures, natural disasters, human mistakes, and data corruption, all while ensuring mission-critical applications maintain high availability. Included with Oracle Database Enterprise Edition, Data Guard is an essential feature for many organizations. Moreover, Active Data Guard serves as a licensed extension of Oracle Database Enterprise Edition, introducing advanced functionalities that enhance the core capabilities of Data Guard, thereby providing even greater resilience and operational efficiency. This combination empowers businesses to maintain uninterrupted access to their vital data assets.
  • 7
    SUSE Linux Enterprise Real Time Reviews
    SUSE Linux Enterprise Real Time serves as a real-time operating system that minimizes latency and enhances the predictability and reliability of time-sensitive, essential applications, whether it’s an IoT sensor keeping tabs on industrial equipment or an edge system that requires immediate responses to external stimuli. Various sectors, including banks, manufacturers, and government entities, depend on applications that must function with precision and reliability under all circumstances. For distributed systems to operate cohesively, they require time synchronization not just within individual servers but also among all interconnected servers. The Precision Time Protocol (PTP) achieves this by synchronizing servers over high-speed networks, boasting accuracy down to sub-microsecond levels. It also features support for device interrupt threads, allowing for optimization at the device level, along with hardware latency detectors to maintain consistent application behavior. With SUSE Linux Enterprise Real Time, you gain a crucial competitive edge in timing efficiency, ensuring your applications run smoothly and reliably. This ensures that your business can respond agilely to market demands while maintaining high standards of performance.
  • 8
    Hydro66 Reviews
    Explore secure colocation services in Sweden with Hydro66 for a data center that is not only simple but also scalable and of high quality. Experience lightning-fast internet connections while deploying a private or hybrid cloud architecture, and establish a secure backup or disaster recovery site tailored to your needs. You can start with just one rack and expand as your requirements grow, taking advantage of our genuinely scalable space and power solutions. If you have higher expectations beyond mere rack space from your colocation hosting provider, we are here to assist you in setting up your equipment, offering various connectivity solutions, and ensuring top-notch security to keep your applications operational at all times. Should you require a colocation cage for enhanced privacy, we will design and construct a space that meets your specific power density and security requirements. The robust mesh steel structure, extending from floor to ceiling, provides unparalleled physical protection for your applications. Additionally, for colocation projects that need to be built to your specifications, we offer a wide array of options regarding resilience, size, and density, giving you the flexibility to meet your unique demands. Our commitment is to provide you with the best solutions to help you thrive in a competitive market.
  • 9
    Data443 Global Privacy Manager Reviews
    We empower retailers to advocate for their customers' privacy rights without sacrificing conversion rates or complicating the processing of Subject Access Requests (SARs). Transform your privacy settings into a benchmark for exceptional user experience and customer service. Ensure that customers have straightforward access to user-friendly privacy settings. Create a centralized hub for all customer privacy concerns, where they can manage their preferences easily. Offer transparent, comprehensible explanations regarding the data you gather and its intended use, fostering trust in your brand. Instead of an all-or-nothing consent model, which is detrimental to both parties, provide options for customers to selectively opt-in or out of specific data collection practices, enhancing their sense of control and potentially boosting your conversion rates. Supply a simple, clear report that illustrates the data you have collected, how it is utilized, and the measures in place to safeguard it. By streamlining your response to Subject Access Requests (SARs), you can improve your customers’ privacy experience while also simplifying the workload for your team. Ultimately, a well-managed privacy framework not only benefits customers but also strengthens your business’s reputation and reliability.
  • 10
    IRI CellShield Reviews

    IRI CellShield

    IRI

    $35 one-time payment
    IRI CellShield®, protects sensitive information in Microsoft Excel®, allowing you to comply data privacy laws. You can protect your columns with reversible or non-reversible masking options. CellShield protects your data, no matter how many sheets they are. Multiple search methods are available to locate and report on PII across the LAN. Protect it all at once with CellShield. Intuitive graphical dialogs allow you to classify and mask it. CellShield's core technology uses the award-winning IRI FieldShield flat file and database data masking product. Data that is hidden in one platform can be seen in another. CellShield EE, the only fully-featured professional data discovery, masking and auditing package for Excel 2010, 2016, and 2019 (plus Office 365 workbooks) in your LAN, is available. CellShield EE goes beyond the security and scope a single password can provide by combining and automating all of these additional capabilities.
  • 11
    StorMagic SvKMS Reviews
    We are convinced that organizations merit a comprehensive solution for managing their encryption keys. SvKMS offers a unified platform that facilitates the management of all encryption keys, regardless of location. Clients can access an enterprise-level key management system suitable for various encryption workflows, whether they operate at the edge, within a data center, in the cloud, or across multiple clouds. With its enterprise-grade functionalities, SvKMS presents a user-friendly interface at an unexpectedly affordable price. It can be deployed anywhere, ensuring high availability without limitations, and supports integration with any operational workflow. The advanced key management capabilities, coupled with robust reporting and authorization features, come at the most competitive price for extensive scaling. Centralized oversight, straightforward configuration, and seamless administration are at the core of the system. By consolidating all encryption key management activities into a unified virtual appliance, SvKMS enhances risk mitigation through a graphical user interface, incorporates REST API-driven workflows, and adheres to KMIP standards, enabling swift customization, comprehensive logging, and effective dashboard auditing and monitoring for various deployment scenarios. This holistic approach ensures that enterprises can efficiently manage their encryption needs while minimizing risks and maximizing operational efficiency.
  • 12
    WatchTower Security Management App Reviews
    Stay vigilant with Check Point's WatchTower Security Management app, allowing you to address security threats swiftly from your mobile device. This user-friendly application offers real-time insights into network activities, providing alerts when vulnerabilities arise, and facilitating immediate action to block potential threats while managing security policies across several gateways. You can monitor all devices connected to your network and identify any emerging risks, receiving timely notifications about malicious activities or unauthorized access. Rapidly responding to malware incidents is made easier as you can isolate infected devices and gather detailed information for in-depth analysis. Tailor your alerts to focus on the most critical security events that matter to you. Additionally, you can categorize all security incidents and delve deeper for further insights. Safeguard your network by configuring advanced security settings for multiple gateways through a secure web user interface, ensuring comprehensive protection. This proactive approach to network management empowers users to maintain a secure environment efficiently.
  • 13
    Multi-Domain Security Management Reviews
    Multi-Domain Security Management enhances security and oversight by dividing security management into various virtual domains. Organizations, regardless of their size, can effortlessly establish virtual domains tailored to geographic locations, business units, or specific security functions, thereby bolstering security and streamlining management processes. This approach facilitates detailed and distinct role-based administration within a multi-tenant security management framework. A unified security management setup governs VPNs, firewalls, intrusion prevention systems, and other protective measures. Administrators can create, monitor, and regulate all network security management domains through a single interface. Additionally, it allows for the centralized management of numerous administrators within the multi-domain security management framework. Administrators can be granted permissions to oversee particular domains or various facets of the multi-domain system, enabling multiple administrators to collaborate across different security management domains simultaneously. This collaborative environment ensures that security measures are effectively maintained and adapted to the evolving needs of the organization.
  • 14
    Aruba ESP Reviews
    Aruba's Edge Services Platform (ESP) represents a cutting-edge, cloud-based framework designed to expedite digital business transformation by facilitating automated network management, providing comprehensive Edge-to-cloud security, and offering predictive insights powered by AI with an impressive accuracy of up to 95%. ESP uniquely provides accelerated response times, enhanced security measures, seamless scaling for users and locations, and operational AIOps, all integrated within a singular cloud-native architecture. It features dynamic segmentation and robust policy enforcement to safeguard new devices effectively. Furthermore, it allows for cloud-managed orchestration that spans wired, wireless, and WAN environments. This platform offers unparalleled flexibility, whether utilized in the cloud, on-premises, or as a service. Users can achieve a holistic view, increased visibility, and control over all domains via a uniform cloud-native console for Wi-Fi, wired, and WAN infrastructure. Additionally, Aruba’s Unified Infrastructure streamlines and enhances IT operations across various environments, including campus, branch, remote, data centers, and IoT networks, ensuring all components are orchestrated and managed efficiently, whether in the cloud or on-premises, resulting in a seamless operational experience.
  • 15
    BugZero Reviews
    BugZero enhances IT operational intelligence while mitigating risks by seamlessly integrating with your ITSM tool to gather, filter, correlate, and monitor vendor-specific non-security bugs. For every IT organization, vendor-related operational bugs remain a persistent challenge. These bugs, which are incorporated into nearly all essential systems, pose a significant threat to both productivity and profitability. BugZero meticulously aligns every relevant software and firmware bug with the corresponding device or system within your organization. It effectively reduces the distraction caused by less critical bugs by prioritizing the severity levels that will prompt ticket generation in your ITSM tool. The solution provides a comprehensive view of the existence, significance, and risks associated with vendor bugs in your infrastructure. Additionally, it guarantees that operational bug information is precise and current by addressing bugs immediately after they are released by vendors. Remarkably, the system can be operational and start reporting on vendor-related bug data in just a few hours, allowing organizations to maintain optimal performance swiftly. This rapid deployment ensures that teams can focus on resolving the most pressing issues right away.
  • 16
    Network Critical Reviews
    Network Critical offers a scalable and enduring visibility layer that enhances network infrastructure while ensuring operations and security remain intact. Our technology is utilized worldwide in various industries, showcasing its versatility. The visibility layer from Network Critical supplies essential data to tools and systems necessary for effectively monitoring and managing your network. By feeding critical network information, this layer enables the optimization and oversight of evolving network infrastructure without sacrificing operational integrity or security measures. Network TAPs serve as the foundational component for intelligent network access, allowing for the monitoring of events within a local network. This approach guarantees comprehensive visibility across all network security and monitoring platforms. Additionally, it delivers outstanding performance and adaptability, which are crucial for managing tools that safeguard network infrastructure, protect sensitive information, and respond to the constantly evolving threat landscape. Furthermore, our solutions not only improve efficiency but also empower organizations to stay ahead in an increasingly complex digital environment.
  • 17
    WEKA Reviews
    WEKA is an advanced data platform that delivers exceptional performance, scalability, and efficiency for AI, machine learning, and high-performance computing applications. By breaking down data silos, WEKA enables seamless integration across cloud and on-premise environments, allowing businesses to manage and analyze vast data sets effortlessly. The platform supports a variety of use cases, including HPC, AI inferencing, and generative AI, with robust infrastructure that accelerates model training and optimizes performance at scale. Additionally, WEKA emphasizes sustainability by reducing energy usage, offering a future-ready solution for data-driven innovation.
  • 18
    Virtono Reviews

    Virtono

    Virtono

    €2.95 per month
    We offer an array of high-quality web hosting options, strategically placed in various data centers across the globe. As a worldwide hosting company, Virtono provides everything necessary for successfully establishing and managing your online presence. Upon payment, your service activation is instantaneous. To enhance read/write performance, we exclusively use NVMe and SSD storage solutions. You'll have full administrative access for both cloud and dedicated servers. With our extensive global network, you can always select the most suitable option for your needs. You can deploy your cloud VPS plan at your convenience, regardless of time or location. Understanding that each client possesses distinct requirements, addressing them is our main focus. We are committed to efficiency, learning from challenges as they arise and making continuous improvements to our offerings. Our dedication to swift response times ensures that you will never be left waiting longer than necessary. Choose the web hosting plan that best aligns with your specific needs and preferences. With our range of customizable options, you can tailor your hosting experience to fit perfectly with your online goals.
  • 19
    Oracle Cloud Infrastructure Reviews
    Oracle Cloud Infrastructure not only accommodates traditional workloads but also provides advanced cloud development tools for modern needs. It is designed with the capability to identify and counteract contemporary threats, empowering innovation at a faster pace. By merging affordability with exceptional performance, it effectively reduces total cost of ownership. As a Generation 2 enterprise cloud, Oracle Cloud boasts impressive compute and networking capabilities while offering an extensive range of infrastructure and platform cloud services. Specifically engineered to fulfill the requirements of mission-critical applications, Oracle Cloud seamlessly supports all legacy workloads, allowing businesses to transition from their past while crafting their future. Notably, our Generation 2 Cloud is uniquely equipped to operate Oracle Autonomous Database, recognized as the industry's first and only self-driving database. Furthermore, Oracle Cloud encompasses a wide-ranging portfolio of cloud computing solutions, spanning application development, business analytics, data management, integration, security, artificial intelligence, and blockchain technology, ensuring that businesses have all the tools they need to thrive in a digital landscape. This comprehensive approach positions Oracle Cloud as a leader in the evolving cloud marketplace.
  • 20
    SUSE Linux Micro Reviews
    SUSE Linux Micro is a streamlined, container-focused Linux operating system specifically tailored for edge computing and microservices applications. With its minimal size, it is optimized for security and performance, making it ideal for deploying applications within containers. This platform facilitates rapid, scalable, and economical cloud-native development, particularly in environments with limited resources. Featuring integrated automation tools and full compatibility with Kubernetes, SUSE Linux Micro ensures seamless integration into contemporary containerized systems. Its design caters to the needs of developers and IT operations teams, allowing them to efficiently deploy and oversee applications across diverse distributed environments. Additionally, its lightweight nature and robust capabilities make it an excellent choice for organizations looking to enhance their container strategies.
  • 21
    Ecosteer Reviews
    Individuals and companies have the option to use decentralized digital technologies to manage data flows and usage. This is based on individual freedom and self-determination. These technologies will allow individuals and companies to have dynamic data portability in real time, as well as various compensation models. Modern capitalism was born in the XIVth century when private property rights over production means were established. Today, data ownership rights will be the foundations for a distributed and decentralized new data economy. Ecosteer Patented data ownership platform technically implements the EU GDPR legal principle of Data Ownership. This gives data owners the ability control third-party access to their data and to receive compensation for data sharing. Ecosteer Data Ownership Platform, which uses end-to-end encryption with blockchain smart contracts, decentralizes data access control and gives it back to the rightful owners.
  • 22
    MBX Hatch Reviews
    Hatch software transforms the execution of hardware projects by changing the way hardware teams collaborate. Designed specifically for the intricate nature of hardware management, Hatch integrates various operational roles into a cohesive unit, equipping users with the necessary tools and visibility to effectively plan, manage, implement, and support hardware solutions, all from a unified platform. The flexibility of Hatch's products allows for a multitude of options without complications. Users can effortlessly tailor product configurations for individual clients by utilizing a single Bill of Materials (BOM) that organizes pre-defined component groupings for countless hardware variations, selectable with just a click. Changes in engineering are monitored within a comprehensive and traceable repository, where every detail including descriptions, deadlines, statuses, reviews, and approvals is centralized. The days of relying on outdated spreadsheets, misplaced emails, and unnecessary software are over. By tracking work in real-time down to the specific work center, you can provide customers with accurate updates regarding their ongoing orders, enhancing customer satisfaction and operational efficiency. This innovative approach not only streamlines processes but also fosters a culture of transparency and accountability within hardware teams.
  • 23
    Recovery Point Reviews
    Recovery Point specializes in cyber resiliency, disaster recovery, and business continuity solutions, dedicated solely to safeguarding your business's performance. With our extensive range of proactive services and solutions, you can trust that your organization is equipped to handle any potential disruptions. Our expertise encompasses cyber preparedness and ransomware recovery, leveraging advanced data protection, automation, orchestration, and unmatched recovery skills. We provide comprehensive hybrid IT and business resiliency solutions for various environments, including x86, mainframe, and heterogeneous systems, seamlessly integrating legacy support with cutting-edge recovery strategies. By employing validated methodologies, we evaluate your current readiness and clearly define your goals, ensuring you have a strategic plan for operational resilience. Furthermore, we implement predictive and proactive tactics that empower you to stay ahead of emerging disruptions, fortifying your organization’s capacity to thrive amidst challenges. In an ever-evolving digital landscape, our commitment to innovation ensures that you are not just prepared but positioned for success.
  • 24
    Tripleplay Reviews
    Tripleplay is an advanced audio-visual integration solution that empowers businesses to seamlessly deliver various media content to any device across diverse networks, ensuring safety, security, and simplicity. It includes an array of technologies such as IPTV, digital signage, and video streaming software, making it a versatile IT-first platform tailored for sports venues, enterprises, banks, government entities, and various other sectors. The platform features three essential services designed to enhance organizational connection and audience engagement. Exclusively available through a global network of channel partners, Tripleplay collaborates with these partners to customize and configure solutions that address each client’s unique requirements while developing meaningful integrations for end users. Additionally, the enterprise IPTV headend platform is capable of capturing and ingesting content from multiple sources, encoding it, and redistributing it seamlessly across an IP network to digital signage displays, desktop video applications, mobile IPTV, and more. This comprehensive approach ensures that organizations can effectively manage and distribute content, ultimately enhancing user experience across all platforms.
  • 25
    Performance Navigator Reviews
    Performance Navigator is a sophisticated graphical tool for PCs that focuses on analyzing performance and modeling capacity across diverse platforms such as IBM i, AIX/VIOS, Linux, Solaris, and HP-UX workloads hosted on IBM Power Systems, Oracle, and HP servers. This tool efficiently gathers historical performance data with minimal impact by securely transmitting information from collection services, NMON, and/or SAR to the Windows client on a nightly basis, ensuring that system history files are consistently updated. Users can benefit from an extensive array of graphs, tailored reports, and features that aid in performance evaluation, server consolidation, and system upgrades. One of the standout features is the "What If" functionality, which enables users to simulate various scenarios to assess the effects of capacity changes on server performance, thereby enhancing capacity planning accuracy. Furthermore, Performance Navigator excels in rapid problem identification, allowing users to receive detailed summaries of system problems in less than two minutes, which greatly aids in troubleshooting efforts. This robust support for multiple platforms makes it an invaluable tool for IT professionals.
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB