Alternatives to AgileWARE

Compare AgileWARE alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to AgileWARE in 2026. Compare features, ratings, user reviews, pricing, and more from AgileWARE competitors and alternatives in order to make an informed decision for your business.

  • 1
    Pipefy

    Pipefy

    Pipefy

    Pipefy is the AI-driven Business Orchestration and Automation Technologies (BOAT) platform that delivers enterprise results in days, not months. Designed as a secure orchestration layer, Pipefy bridges the gap between rigid legacy systems (ERPs/CRMs) and agile business needs. It allows IT teams to centralize disparate processes under a single control plane, eliminating Shadow IT through an Adaptive Governance framework. Key Capabilities: • Process Orchestration: Manage complex, non-linear workflows across departments without replacing core systems. • Enterprise iPaaS: Native connectors for the main systems of records to unify data silos. • Agentic AI: Deploy autonomous AI agents for document analysis and task execution using a BYOLLM (Bring Your Own LLM) engine. • Security: SOC2 Type II and ISO 27001 certified with granular RBAC. Empower your team to modernize operations and reduce the development backlog with Pipefy.
    Leader badge
    Compare vs. AgileWARE View Software
    Visit Website
  • 2
    Serviceaide

    Serviceaide

    Serviceaide

    Serviceaide is a complete service management solution that can be implemented in weeks, not months, and intuitive to use. With low administration costs and quick implementation, you will see a real return on your investment. A flexible platform that works either on premise or in the cloud. Serviceaide is based on ITIL best practices and has been designed to be a comprehensive solution with all the components your team needs. You can choose the environment that best suits your technology, compliance, and infrastructure needs. Affordable and comprehensive, Serviceaide provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. Serviceaide includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity. Automate processes across technical workflows, services and business processes for business agility.
    Compare vs. AgileWARE View Software
    Visit Website
  • 3
    LogicGate Risk Cloud
    LogicGate’s leading GRC process automation platform, Risk Cloud™, enables organizations to transform disorganized risk and compliance operations into agile process applications, without writing a single line of code. LogicGate believes that flexible, easy-to-use enterprise technology can change the trajectory of organizations and the lives of their employees. We are dedicated to transforming the way companies manage their governance, risk, and compliance (GRC) programs, so they can manage risk with confidence. LogicGate’s Risk Cloud platform and cloud-based applications, combined with raving fan service and expertly crafted content, enable organizations to transform disorganized risk and compliance operations into agile processes, without writing a single line of code.
  • 4
    AgilePoint NX

    AgilePoint NX

    AgilePoint

    AgilePoint Low-Code Digital Process Platform enables businesses to accelerate digital transformation by empowering its multidisciplinary teams to automate, streamline, or consolidate workflows and processes, and continuously improve customer outcomes, increase operational effectiveness, drive revenue growth while ensuring resilience and scalability.
    Starting Price: $39/month/user
  • 5
    Tufin

    Tufin

    Tufin

    Tufin enables organizations to automate their security policy visibility, risk management, provisioning and compliance across their multi-vendor, hybrid environment. Customers gain visibility and control across their network, ensure continuous compliance with security standards and embed security enforcement into workflows and development pipelines. Eliminate the security bottleneck and increase the business agility of your organization. Existing manual approaches to managing network changes can take weeks and introduce errors resulting in potential security risks. Organizations across the world rely on Tufin’s policy-based automation to automate visibility and provisioning and maximize business agility and security. Maintaining and demonstrating compliance with industry regulations and internal policies is difficult within today’s complex and fragmented networks. Tufin enables enterprises to ensure continuous compliance and maintain audit readiness.
  • 6
    Planview AgilePlace
    Planview AgilePlace is an enterprise Kanban software designed to help organizations visualize, manage, and optimize the flow of work from strategy to delivery. It enables teams to track work using flexible Kanban boards that support Lean and Agile practices at scale. AgilePlace improves prioritization and alignment by connecting day-to-day work with strategic objectives. Built-in metrics and analytics help teams identify bottlenecks and reduce delivery risks. The platform supports cross-team collaboration with real-time updates, comments, and notifications. AgilePlace integrates with popular enterprise tools like Jira, Azure DevOps, and ServiceNow. By combining visualization, automation, and AI-powered insights, it helps organizations deliver value faster and more predictably.
    Starting Price: $12.00 per user per month
  • 7
    Blue Planet
    The Blue Planet Intelligent Automation Portfolio is a comprehensive, open software suite that empowers service providers with deep insights about the network to optimize business processes that span IT and Network functions, accelerating your digital transformation. IT and Network operations are no longer constrained in legacy, manually intensive silos. Blue Planet powers closed-loop automation through multi-domain, multi-layer orchestration combined with inventory federation, analytics, and route optimization and assurance, unlocking network potential and business agility. Working across multi-vendor domains, including Ciena’s domain controlled by Manage, Control and Plan (MCP), Blue Planet intelligent automation enables the delivery of a range of end-to-end services with fast time to market and exceptional performance, at reduced operational costs.
  • 8
    RackWare

    RackWare

    RackWare

    Gain flexibility and control access across any physical, virtual or cloud environment. RackWare helps enterprises migrate to the cloud, protect their workloads through backup and disaster recovery, and manage multiple physical, virtual, and cloud environments on a single pane of glass. RackWare’s Hybrid Cloud Platform (HCP) is a multi-function solution that enables enterprises to migrate workloads to the cloud, configure disaster recovery, and provide comprehensive oversight and management of all cloud resources (hybrid cloud management). HCP is a distributed software solution that runs on Linux virtual machines. The value in RackWare’s HCP lies both in the breadth and depth of its capabilities, providing an end to end solution for the entire cloud journey - from migration, to DR and back-up, to hybrid multi-cloud management.
  • 9
    Recovery Point

    Recovery Point

    Recovery Point

    Recovery Point is a pure-play provider of cyber resiliency, disaster recovery, and business continuity solutions. Our focus is on one goal, to protect the performance of your business. Through our comprehensive suite of proactive services and solutions, you can have confidence your organization is ready for any disruption. Cyber preparedness and ransomware recovery, utilizing modern data protection, automation and orchestration, and unparalleled recovery expertise. Hybrid IT and business resiliency for x86, mainframe, and heterogeneous environments, blending legacy support with modern recovery solutions. Using proven methodologies, we assess your current level of readiness and develop a clear definition of your objectives, ensuring a roadmap to operational resilience. Harness predictive and proactive strategies to ensure you stay ahead of the next generation of disruptions.
  • 10
    Comarch SQM
    Comarch Service Quality Management (SQM) transforms traditional network-centric telecom monitoring into customer-centric telecom service quality management. Telecom service quality management demands insight into customers' perceptions of service quality. With this in place, you can prioritize network performance management based on forecasts of the influence of events on customer experience, and thus deliver high-level customer service assurance. Comarch SQM enables you to become proactive in managing telecom service quality by preventing customers from experiencing service problems, thanks to trend analysis and predictive maintenance capabilities. The digital era has raised customer expectations about the range and quality of services delivered by any company. Traditional network and customer service assurance management is no longer enough to keep your customers satisfied. Today, you need to manage service quality proactively.
  • 11
    Juniper Network as a Service (NaaS)
    Juniper's Network as a Service (NaaS) offering delivers a turnkey, flexible, and scalable full stack of industry-leading AIOps networking services, which includes wired, wireless, and secure SD-WAN solutions. With NaaS, it is now extremely easy to access this technology and consume it as a network service. Juniper’s NaaS offering is subscription-based, requires zero upfront CapEx investment, and includes best-in-class platform capabilities, such as open APIs and Juniper Mist AI. It serves as a one-stop shop for an end-to-end flexible AI-native networking experience. Now you can easily procure cloud services, manage network usage, and ensure the best user experiences across multiple locations, no matter your deployment size. Juniper’s NaaS offering helps you transform your network experience into a flexible, consumption-based networking model that delivers the simplicity, agility, and efficiency your business deserves.
  • 12
    FotoWare

    FotoWare

    FotoWare

    FotoWare is a world-leading provider of Digital Asset Management (DAM) solutions. Our software enables organizations to store all their important files in a central system while making it easier to find, share, and re-use those files more efficiently. FotoWare was one of the first in the world to offer a DAM system, and now empowers more than 200,000 users and 4,000 customers in a wide range of industries worldwide. Customized services and customer care to help you maximize the potential of your FotoWare. Ready-made integrations, or connect with our technology partners for a customized solution. Streamline content creation and asset handling by automating manual workflows. Helping organizations handle photos and videos in compliance with data protection regulations. The FotoWare Mobile App puts the power of a complete Digital Asset Management system in your pocket.
    Starting Price: €67 / month
  • 13
    Cora SeQuence
    Orchestrate a more effective flow of work with Cora SeQuence. Generate growth, improve cost efficiency, and drive business agility. Our HotChange® technology lets end users see how they're employing resources and processing performance. Make real-time changes to get the most from business-critical processes. Design advanced customer workflows with an intuitive interface. Reduce pain points and transform the customer experience with our SeQuence CRM edition that has solutions for a wide range of industries. Model, configure, run, monitor, and transform end-to-end business processes with our simple drag-and-drop functionality. Predictive analytics and connectors for robotic automation, artificial intelligence, and the internet of things help digitize any business process.
  • 14
    VMware Live Recovery
    Secure cyber and site recovery at scale with a unified management experience across on-premises and public clouds Protect and recover VMs across on-premise and public clouds with fully automated orchestration at scale and a unified management experience. Confident, fast recovery from modern ransomware with live behavioral analysis of powered-on workloads in an on-demand isolated recovery environment (IRE). Flexible licensing across use cases and clouds, with the assurance of single-vendor support. Enable a safe, controlled recovery from ransomware with an on-demand environment secured, built and managed by VMware. Identify fileless attacks with embedded Next-Gen AV and Behavioral Analysis of powered-on workloads.
  • 15
    CyberMapper

    CyberMapper

    NoviFlow

    NoviFlow’s CyberMapper accelerates and dynamically scales cybersecurity services and virtualized network functions into the Terabit scale by implementing a powerful Security Load Balancer, packet filtering and telemetry solution that leverages is a high-performance programmable network fabrics. CyberMapper achieves unprecedented performance, flexibility, and scale by leveraging the power of programmable match-action pipelines, white-box hardware, and open standard interfaces such as OpenFlow, gRPC and P4-runtime. CyberMapper enables NoviWare™ compatible switches (such as NoviFlow’s NoviSwitches and select white-box switches running the powerful Intel/Barefoot Tofino) to deliver load balancing, packet brokering, and telemetry directly in the network fabric in a simple, scalable, compact form factor, and at a fraction of the price of conventional load balancing solutions.
  • 16
    Cisco Cloud Native Broadband Router
    Transform your network and scale beyond the physical infrastructure by virtualizing your CCAP with the Cisco Cloud Native Broadband Router. Built from the ground as a cloud native application composed of containerized microservices using open-source tools, the Cisco Cloud Native Broadband Router delivers nonpareil scalability, elasticity, and resilience. Designed and coded from the ground up as a composition of multiple services for elasticity, resiliency, and composability. Based on open, modular, standards-based software, including Kurbernetes and Docker, for rapid and agile development and deployment. Change the way you operate your network with real time monitoring, analysis, and remediation. Take advantage of web-scale operations with auto-provisioning, auto-scaling, and auto-redundancy. Written for the cloud as software independent of hardware. Compatible with bare metal and designed to be portable across multi-cloud environments.
  • 17
    Kaholo

    Kaholo

    Kaholo

    Scriptless CI/CD Automation for On-Demand Developer Portals Kaholo is a low-code IT workflow automation tool that empowers Developers to quickly self-serve environments and automate their workflows while giving Operators full visibility and control over compliance, security, and cloud costs. Key Capabilities: - Drag and drop low-code CI/CD pipelines - 150+ pre-built plugins that interact with external resources that anyone can use without proprietary knowledge, or custom-build your own - Orchestrate your existing CI/CD toolset to avoid the inefficient route of rip and replace - Extensive access permissions allow developers to safely work with and execute pipelines autonomously - Automate provisioning, testing, security scans, builds, deployments with various rollout strategies, rollbacks, cleanups, updates, troubleshooting, remediations, migrations, and more. - Integrations with all cloud providers as well on-prem environments
    Starting Price: $99 per month
  • 18
    Juniper SD-WAN

    Juniper SD-WAN

    Juniper Networks

    Juniper SD-WAN, driven by Juniper Mist AI, enables exceptional IT- and end-user network experiences. Powered by Juniper Session Smart Routing and Juniper Mist WAN Assurance, it simplifies network operations and safeguards business matters from client to cloud. Juniper's SD-WAN solution offers unparalleled secure and resilient connectivity tailored for today’s cloud-focused enterprises. Leveraging AI-Native insights and automation, it streamlines deployment processes and significantly diminishes the time required for troubleshooting. In addition, a pioneering tunnel-free architecture eradicates the inefficiencies, scaling limitations, and cost constraints traditionally associated with legacy solutions. Juniper's microservices cloud solution, Mist AI, ensures rapid deployment through Zero Touch Provisioning (ZTP) and simple, proven templates that minimize errors. It scales dynamically to align with your changing needs while offering seamless integration with platforms.
  • 19
    Digital.ai Agility
    Digital.ai Agility (formerly VersionOne): Get enterprise agile management. Unify and enable teams at all levels across the organization to envision and deliver great software. Designed from the ground up for agile and lean software development. Scale up and out across teams, project workspaces, portfolios, and locations. Automate decision-making insight across your entire software lifecycle. Engage with team members throughout your organization. Tap the potential of your people knowledge, processes, and tools with Agility. Use it across your enterprise and engage stakeholders to help identify potential business and product issues, and improve software quality. Agility supports Scrum, Kanban, XP, SAFe® and hybrid development methodologies and makes it easier to plan, track, and report across all teams, programs, software portfolios, and the enterprise.
  • 20
    Cisco NX-OS
    Cisco NX-OS is a robust data center operating system engineered to enhance network agility, scalability, and security. It offers a flexible architecture that supports technologies like Virtual Extensible LAN (VXLAN) with Ethernet VPN (EVPN), enabling seamless scalability and efficient traffic management. The system simplifies network operations through accelerated provisioning and comprehensive management facilitated by the Cisco Nexus Dashboard Fabric Controller (NDFC), complemented by open APIs for streamlined automation. Security is bolstered with end-to-end network segmentation and encryption protocols, including MACsec and RADsec, ensuring data integrity and protection. Additionally, Cisco NX-OS is optimized for high-performance tasks such as artificial intelligence and machine learning, featuring non-blocking networks and ultra-low latency switches to effectively handle demanding workloads.
  • 21
    Hooper

    Hooper

    Hooper

    Hooper brings powerful data orchestration to address distributed information across the enterprise. Its hyper-automation & low-code app platform manage & deliver information to the right people, at the right time. Hooper helps you execute strategies and processes with Rapid App Development (RAD), enabling you to design workflows for your business enterprise with a drag-and-drop-based visual designer. Manage teams and integrate with legacy systems for enhanced agility and frictionless functioning. With Hooper, you can create solutions that are tailored to your needs. From creating a complex sales management system or a simple registration portal, do it all, without coding. Hooper is a visual development-based platform, anyone can create apps and solutions without having to write code. Enable quick onboarding and collate teams with e-invites. Aided with a highly customizable privilege control system, manage visibility and interaction on a field-to-field basis.
  • 22
    Cisco Evolved Programmable Network (EPN) Manager
    Cisco Evolved Programmable Network Manager (EPNM), simplified, converged, multilayer management. Our EPN Manager is designed for element and network management systems. It provides simplified, converged, end-to-end lifecycle management for carrier-grade networks of all sizes. Businesses can improve agility and operational efficiencies through automated device operations, fast provisioning, and proactive assurance. Reduce time to market of network services, and time from device introduction or features updates to actual network deployment. Deliver frequent, domain-specific content asynchronous from the management platform. Resolve network issues faster, and quickly identify affected circuits and virtual connections through automated provisioning of services. Benefit from a shared information model, consistent workflows and UI, and easier deployment. Get integrated, end-to-end management for the entire carrier network, supporting multiple domains, right out of the box.
  • 23
    Juniper AI-Native Networking Platform
    Make every connection count with the industry’s first AI-Native Networking Platform, purpose-built to leverage AIOps to ensure the best operator and end-user experiences. Whether leveraging AI for your network or building the optimal network for AI, Juniper provides the agility, automation, and assurance you need for simpler operations, increased productivity, and reliable performance at scale. Our AI-Native Networking Platform leverages over nine years of AI learning to ensure that every connection is reliable, measurable, and secure for every device, user, application, and asset. We start with the right experience-first questions, answered by the right telemetry and user state data pulled from routers, switches, access points, firewalls, and applications. Juniper’s AI-Native Networking Platform is continuously learning and getting more efficient. Trained on nine years of reinforced learning, the AI-Native Platform turns data into actionable insights.
  • 24
    IBM Resiliency Orchestration
    IBM Resiliency Orchestration offers Disaster Recovery (DR) and Cyber Incident Recovery (CIR) monitoring, reporting, testing and workflow automation capabilities of complex hybrid IT environments in a scalable, easy-to-use solution built on industry standards. Choose from 450 pre-packaged patterns and intelligent workflow automation to improve reliability while reducing the need for extensive expertise for enterprise applications. Orchestrate DR life cycle management with an automated workflow that limits human error, enables faster recovery while ensuring that DR activities are performed within SLAs. Cyber Incident Recovery, a capability of IBM Resiliency Orchestration is designed to recover data and platform configurations very quickly in the event of a cyber outage. Enable predictable recovery within business-set SLAs with DR exercise automation and ensure consistent achievement of prescribed RTO/RPO.
    Starting Price: $39.50 per month
  • 25
    Project Ares

    Project Ares

    Circadence

    Elevate your cyber classes with our gamified cyber labs. Project Ares delivers fun student learning through gamified cyber range practice labs. Hands-on skills learned in real-world scenarios transfer directly to cybersecurity work roles. Project Ares cyber labs deliver hands-on practical experience right in the classroom. Realistic network environments and hands-on tasks enable interactive learning. Basic cybersecurity concepts such as the cyber kill chain, ports and protocols, and binary hexadecimal conversion are taught through fun, classical game experiences. Specialized labs are red or blue team-oriented and tackle threats including botnet, file theft, and ransomware. Fun to play for professionals and students alike to show mastery of cybersecurity concepts like the cyber intrusion kill chain, ports and protocol, regular expression techniques, and more. Realistic network environments and hands-on tasks enable interactive learning.
  • 26
    Cisco ACI
    Achieve resource elasticity with automation through common policies for data center operations. Extend consistent policy management across multiple on-premises and cloud instances for security, governance, and compliance. Get business continuity, disaster recovery, and highly secure networking with a zero-trust security model. Transform Day 2 operations to a more proactive model and automate troubleshooting, root-cause analysis, and remediation. Optimizes performance, and single-click access facilitates automation and centralized management. Extend on-premises ACI networks into remote locations, bare-metal clouds, and colocation providers without hardware. Cisco's Multi-Site Orchestrator offers provisioning and health monitoring, and manages Cisco ACI networking policies, and more. This solution provides automated network connectivity, consistent policy management, and simplified operations for multicloud environments.
  • 27
    CyberFOX DNS Filtering
    CyberFOX DNS Filtering is a cybersecurity service that blocks malicious websites, phishing, ransomware, and unwanted content at the DNS layer before they can ever reach a network, helping organizations protect users and systems from common online threats and compliance risks. It uses AI pattern recognition and IPv6 support to identify and stop both known and unknown harmful domains, and offers granular policy controls that let administrators set customizable rules by location or device to manage access and safety across environments. CyberFOX provides real-time reporting and analytics to give visibility into web activity, detailed insights for security teams, and tools to help meet compliance standards like CIPA and NIST frameworks. Deployment is designed to be easy and scalable, with an intuitive dashboard that lets teams get up and running quickly and manage DNS filtering without complex hardware or configuration, supporting everything from small businesses to large enterprises.
  • 28
    Cisco 5000 Series
    The Cisco ENCS is a hybrid platform that combines the functionality of a traditional router and a traditional server with a smaller infrastructure footprint. Deploy network services in minutes. With the Cisco Enterprise Network Compute System, you can virtualize all your services in the branch, including routers. The ENCS 5000 provides service agility and density needed for the branch that has limited IT resources. The 5000 Series is a purpose-built compute platform optimized to run VNFs. Using VNFs saves time and simplifies operations. Zero-touch automation enables fast and flawless branch deployments and management. Cisco's open-ecosystem approach to Network Functions Virtualization (NFV) in the 5000 Series enables other vendors to have their VNFs certified to help ensure compatibility and interoperability.
  • 29
    Infraon OSS
    Swiftly manage multiple solutions across different vendors with a centralized and easy-to-use console. Get data-rich insights to address network, fault, performance, resource, and change management challenges. Manage hybrid networks (legacy and virtualized), as well as software-defined and self-organizing networks for easy customer enablement. Infraon’s product suite is SOC2 certified, meeting world-class standards for data security, availability, processing integrity, confidentiality, and privacy. Infraon OSS is a comprehensive system that bridges physical to virtualized infrastructure with seamless management of hybrid, transport, fiber, IP, and wireless networks. Optimize your infrastructure, automate your operations, and monetize your services to increase your competitiveness and become an agile, effective, and efficient service provider. End-to-end provisioning from the beginning. Periodic OS image, configuration backup, and change alert.
  • 30
    Cisco Enterprise Network Functions
    ​Cisco's Enterprise Network Functions Virtualization (NFV) solution enables organizations to virtualize critical network functions, allowing rapid deployment of network services across dispersed locations. By converting traditional hardware-based network functions into software, Cisco's NFV reduces the need for multiple physical appliances, leading to cost savings and simplified management. Cisco's NFV solution accelerates the deployment of new virtual network services, reduces operational complexity, and offers the flexibility to mix physical, virtual, Cisco, and third-party devices and services. This approach not only cuts costs but also frees up IT resources by minimizing the need for service visits, thereby enhancing overall network efficiency. It manages and automates the provisioning of network services across hardware or virtual platforms, streamlining operations and reducing manual interventions.
  • 31
    F5 Distributed Cloud Network Connect
    Rapidly connect instances deployed across multiple cloud regions and/or different cloud providers using Distributed Cloud Network Connect and its automated provisioning, integrated service stack, and end-to-end visibility. Your cloud instances will be connected in minutes and always visible for rapid troubleshooting. Easily and securely connect networks across public clouds, hybrid clouds, and edge sites via an agile SaaS-based service. Automated provisioning of links and network services with end-to-end orchestration across sites and providers to reduce complexity and simplify ops. Continuous and consistent network visibility across all sites within and across cloud providers enables faster troubleshooting and issue resolution. Native integration and automation of services including routing, access, and segmentation abstracts network complexity and accelerates deployment. Gain consistent visibility within and across all connected sites.
  • 32
    Infoblox Cloud Network Automation
    Chances are, your use of private, hybrid and multi-cloud architectures is becoming critical to business agility and efficiency. And yet the complexity of managing essential network services such as DNS can prevent you from realizing the full promise of the cloud. Automation at the network layer is fundamental to your success. Infoblox dramatically shortens the time needed for provisioning and deprovisioning critical network services in cloud and virtualized environments. Infoblox can deliver local, redundant (highly available) DDI services for every cloud instance at every location. Through the Cloud Platform Appliance flexible deployment architecture, critical network services can be deployed in a variety of ways to suit your unique requirements. In addition to the massive manual labor savings gained through task automation, Infoblox provides one central management GUI for all cloud network automation tasks, regardless of the number, size and geographical location of the clouds.
  • 33
    Metanet Hosting

    Metanet Hosting

    Metanet Hosting

    We are a full-service, premium New York Data Center and Colocation hosting provider, offering white-glove support that your business can depend on. Our flexible solutions are designed to help enterprises and network providers build and scale their agile IT environments. The METANET Network (AS11070), fully owned and operated, is a BGP4 multihomed, 100% Cisco-powered network, featuring redundant Industrial Cisco ASR routers, Catalyst 9000 switches, backup UPS systems, and a Mitsubishi Diesel Generator for backup power. With battery reserves located on the roof of 111 8th Avenue, we can maintain building operations for multiple days in the event of a blackout. Boasting over 300 network peering sessions, ultra-low latency, and direct access to 10Tbps connectivity, the METANET Network ensures business continuity through carrier-neutral redundancy and a diverse range of ISP and Telco options, including Verizon, Telia, ATT, and up to 60 carriers and cloud networks.
    Starting Price: $99 per month
  • 34
    TimeShareWare

    TimeShareWare

    SS&C Technologies

    The TimeShareWare is the industry leader all-in-one software that addresses the needs of all sizes and types of shared-ownership resorts, including vacation clubs, fractional properties, condo-hotels, vacation rentals and timeshare resorts. A modular platform encompassing solutions for prospect marketing, contact management, sales and contracts including contract processing, owner services, inventory management, and reservations and property management. TimeShareWare products support a range of options, from simple cloud-based, out-of-the box solutions to customized, end-to-end enterprise applications. -TimeShareWare Enterprise solution for large resorts, travel clubs, and enterprise-level businesses, -TimeShareWare Professional as a tried-and-tested solution for small to mid-level resorts, and -TimeShareWare Essentials as a SaaS product for most small, single-site locations. TSW has the industry experience and full-level support to meet whatever your resort needs
    Starting Price: Product specific
  • 35
    MetaPhish

    MetaPhish

    MetaCompliance

    MetaPhish is a phishing simulation software that allows the administrator to orchestrate phishing simulations and ransomware attacks to directly target their staff and management. Ultimately, this will keep staff safe from phishing scams through automated training that increases their vigilance and identifies the need for additional cyber awareness training. Choose from an extensive range of regularly updated phishing templates. Templates are based on current phishing threats which imitate reputable websites and brands. The templates can be matched with relevant domain names that improve the ease of use within your organization’s network. The templates are all fully customizable and can be adapted to suit specific business sectors. Phishing emails can be created from the ground up using our in-house design team and the extensive range of templates are available in 12 different languages.
  • 36
    Junos Space Network Management
    Junos Space Network Management Platform works with our management applications to simplify and automate management of Juniper’s switching, routing, and security devices. As part of a complete solution, the platform provides broad fault, configuration, accounting, performance, and security management (FCAPS) capability, same day support for new devices and Junos OS releases, a task-specific user interface, and northbound APIs for integration with existing network management systems (NMS) or operations/business support systems (OSS/BSS). The platform helps network operators at enterprises and service providers scale operations, reduce complexity, and enable new applications and services to be brought to market quickly, through multilayered network abstractions, operator-centric automation schemes, and a simple point-and-click UI.
  • 37
    Juniper Session Smart Router
    The Session Smart™ Router powers Juniper’s SD-WAN solution that’s designed to connect users with exceptional experiences. Built on an application-aware and zero-trust secure network fabric, it meets the most stringent enterprise performance, security, and availability requirements. The router overcomes inherent inefficiencies of conventional solutions with a tunnel-free architecture that enables improved performance, fast deployments, and cost savings. The software solution can run on customer premises equipment (CPE), on data center network servers, and in the cloud for flexible deployments. It is centrally manageable using the AI-driven Juniper Mist™ cloud or the Juniper Session Smart Conductor platform. Application-aware routing, fail-safe service delivery, orchestration and automation, zero trust security, and centralized management using the Juniper Mist Cloud or Session Smart Conductor.
  • 38
    Snow Commander
    Snow Commander is a powerful hybrid cloud management tool that leverages automation to deliver business agility, oversight, and efficiency. This tool enables IT to eliminate cumbersome, manual approval processes and provide end users with a quick, self-service way to access both public and private clouds that won’t slow down the most agile development teams. Increase agility and efficiency with streamlined hybrid cloud management. Snow Commander uses automation to provide end users with quick and easy access to both public and private cloud resources. The comprehensive self-service portal provides IT with the visibility needed to effectively govern resource usage, while self-service provisioning automation capabilities ensure that the most agile development teams don’t miss a beat. A feature-rich workload engine enables change orchestration with cost analytics, governance policy, and automation. It also boasts extensible functionality to empower process transformation.
  • 39
    Mimic

    Mimic

    Mimic

    Cyber extortion, the endgame of ransomware attackers, has emerged as the most perilous, destructive, and fastest-growing breed of cybercrime, demanding fundamentally new technical approaches to combat it. Completely new detection technology focused exclusively on ransomware. Real-time deflection of ransomware from critical enterprise assets. Rapid recovery of critical assets to a completely clean recovery environment that mimics yours. Mimic’s solutions are being built in collaboration with major banks, telcos, retailers, and healthcare providers. Our technology has proven effective and scalable in some of the largest and most critical networks in the world. Rapidly identify and subvert cyber extortion attempts with attack-resistant technology that focuses solely on the specific signals of ransomware behavior. Our defenses employ many different techniques, which evolve over time to out-maneuver adversaries' attacks.
  • 40
    Cisco Catalyst 8500 Series Edge Platforms
    Designed for security, built for scale. Create a superior network edge with accelerated aggregation services, multicloud networking, and edge intelligence. Enjoy cloud-scale performance with accelerated services that are powered by custom application-specific integrated circuit (ASIC) architecture. Centrally manage your environment with Cisco vManage. Get actionable insights across the internet, cloud, and applications with built-in Cisco vAnalytics and Cisco ThousandEyes solutions. Gain industry-leading multilayered protection—and move to secure access service edge (SASE) with SD-WAN for on-premises and cloud-delivered security. Deliver outstanding service and agile connectivity to users near and far.
  • 41
    Infiny

    Infiny

    Epsilon Telecommunications

    Experience the Future of Networking with Infiny, NaaS Platform. Achieve high-performance global interconnectivity through our award-winning Network-as-a-Service (NaaS) platform to seamlessly extend your global network and voice coverage on-demand. Discover the unparalleled capabilities of Infiny as it introduces transparency and agility to your network and its interconnected ecosystem. Empower your network with advanced orchestration tools that facilitate seamless connection management, providing a new level of operational simplicity Experience greater agility through on-demand network provisioning and scaling in a matter of seconds, creating a dynamic and responsive networking environment Gain actionable insights in real-time with advanced analytics, ensuring swift troubleshooting and management to stay ahead of potential challenges Effortlessly forge cohesive connections and enhance user experiences by seamlessly integrating Infiny into existing platforms.
  • 42
    Tungsten TotalAgility

    Tungsten TotalAgility

    Tungsten Automation

    Tungsten TotalAgility (formerly Kofax TotalAgility) streamlines building and deploying intelligent process automation so you can expand human and digital workforce capacity. Receive, execute, route and report on workflow tasks from a single platform. Our intelligent document processing technology processes documents and data with the highest accuracy and speed. Powerful tools to build, deploy and accelerate enterprise automation. A central intelligent automation platform to handle dynamic tasks, trigger automated rules and deploy on-demand workforce capacity. Deliver enhanced customer experiences across any channel and any device. Empower citizen developers, professional developers and administrators to solve problems and scale innovation. Process documents from any channel with powerful AI. Eliminate manual data extraction from workflows. Deploy smart digital workers for high-value workflows and time consuming tasks.
  • 43
    Juniper Cloud-Native Router
    The Cloud-Native Router takes full advantage of container economics and operational efficiencies, giving service providers the flexibility they need to deploy 5G. The performant, software-based router combines Juniper’s proven routing technology, the Junos OS containerized routing protocol daemon (cRPD), and Contrail vRouter DPDK forwarding plane for x86 processors. It integrates seamlessly with the Kubernetes Container Network Interface (CNI) framework. The router complements Juniper’s physical routers with advanced networking features for cloud-native environments where space, power, and cooling are limited. Based on the same Junos OS routing technology, hybrid physical and virtual networks provide a single experience end to end. The Cloud-Native Router is a key component in the 5G Distributed Radio Access Network (D-RAN) and in 5G Core data centers hosted in hyper scaler cloud environments.
  • 44
    Continuity Patrol
    Redefine your approach to recovery with the industry’s most comprehensive, most-modernized recovery automation suite. In today’s always-on business world, customers, partners, and employees expect 24/7 access to services and data. Unplanned downtime from natural disasters, cyber-attacks, and outages are the biggest availability threats. With an effective recovery plan and solution in place, organizations become resilient and are able to easily resume operations with minimal downtime and data loss. Continuity Patrol™ from Perpetuuiti’s Resiliency Automation Platform enables organizations to recover from disruption or an outage with the lowest recovery point objectives RPOs and fastest recovery time objectives RTOs in the industry, dramatically limiting data loss and downtime. One simple, agile solution saves you time, resources and costs while making it easier and faster to manage workloads at scale.
  • 45
    UnitedLayer

    UnitedLayer

    UnitedLayer

    UnitedLayer offers colocation services from a state-of-the-art data center, providing secure and scalable infrastructure that enables businesses to house their servers and networking equipment within a reliable environment. Their colocation solutions include a managed services portfolio with offerings such as remote hands, smart hands, network management, and disaster recovery, all designed to enhance operational efficiency and agility. With over two decades of experience, UnitedLayer supports enterprises, SMBs, government agencies, and startups in maximizing the benefits of their multicloud investments. Their colocation services ensure improved responsiveness, resource utilization, and scalability, resulting in better customer experiences and faster time to market.
  • 46
    ImageWare CloudID
    ImageWare CloudID® is a highly modular, software platform that enabled rapid development and deployment of highly secure, yet flexible biometric identity management solutions. ImageWare CloudID® is easily incorporated into new or existing cloud-enabled environments or integrated as cloud-ready software into traditional networked client server and data center IT infrastructures. Two innovations differentiate this biometric identity platform, virtually any biometric modality and algorithm from any vendor can be quickly incorporated into the system, and the system can be easily scaled to satisfy the requirements of small organizations or entire counties, providing ultra-scalable real-time solutions. ImageWare CloudID’s server platform is a set of configurable, server-based software modules designed to add or enhance biometric identity management and credential issuance capabilities to existing applications or support the development of these capabilities in new end-to-end applications.
  • 47
    DANOS-Vyatta

    DANOS-Vyatta

    IP Infusion

    DANOS-Vyatta edition NOS is aligned with Open Compute Project in delivering a cell site gateway router (CSGR) use case. As mobile service providers make the transition from legacy technologies toward 5G RAN technologies, the CSGR is designed to address the changing needs of operator’s backhaul transport requirements. Based on the DANOS open source software, DANOS-Vyatta edition is a production-ready, carrier grade, feature-rich network operating system (NOS) that meets the demand for functionality and reliability required in the carrier environment. Highlights of DANOS-Vyatta edition The NOS architecture is designed for abstractions with clean APIs between the layers for development agility, troubleshooting and ease of supporting multiple white boxes. The application layer encompasses all the routing and supporting processes along with the standard APIs and familiar CLI interface for operators and management, automation, orchestration systems to interact with the NOS.
  • 48
    Embroker

    Embroker

    Embroker

    Embroker helps you get cyber liability insurance to cover both first and third-party financial losses resulting from data breaches and other cybercrimes that may compromise sensitive company and customer information. A cyber insurance policy, also referred to as “cyber risk insurance” or “cyber liability insurance” coverage, is a financial product that enables businesses to transfer the costs involved with recovery from a cyber-related security breach or similar events. Typically, the most important aspect of cyber insurance will be network security coverage. This coverage will respond in the event of a network security failure – such as data breaches, malware, ransomware attacks and business account, and email compromises. However, the policy will also respond to liability claims and ancillary expenses of an attack or breach.
  • 49
    Actifio

    Actifio

    Google

    Automate self-service provisioning and refresh of enterprise workloads, integrate with existing toolchain. High-performance data delivery and re-use for data scientists through a rich set of APIs and automation. Recover any data across any cloud from any point in time – at the same time – at scale, beyond legacy solutions. Minimize the business impact of ransomware / cyber attacks by recovering quickly with immutable backups. Unified platform to better protect, secure, retain, govern, or recover your data on-premises or in the cloud. Actifio’s patented software platform turns data silos into data pipelines. Virtual Data Pipeline (VDP) delivers full-stack data management — on-premises, hybrid or multi-cloud – from rich application integration, SLA-based orchestration, flexible data movement, and data immutability and security.
  • 50
    TrueSight Automation for Networks
    Network configuration and automation for better agility, security, and efficiency. Includes automated vulnerability management to analyze vulnerabilities, enhance visibility, and respond to threats across network devices. Leverage integration with vendor and NIST National Vulnerability DB security notifications to identify vulnerabilities, remediate device images, and upgrade devices with zero downtime. Drive fast configuration changes across thousands of network devices with automated roll-back and change tracking. Control device access to view or change settings, deploy pre-configured policies for regulatory standards such as CIS and DISA and remediate non-compliance. Deploy new physical or virtual network devices rapidly with gold-standard configurations to respond to business needs. Browse real-time device configurations to troubleshoot, view status of jobs, or complete a compliance audit.