28 Integrations with Fujitsu Biometrics-as-a-Service

View a list of Fujitsu Biometrics-as-a-Service integrations and software that integrates with Fujitsu Biometrics-as-a-Service below. Compare the best Fujitsu Biometrics-as-a-Service integrations as well as features, ratings, user reviews, and pricing of software that integrates with Fujitsu Biometrics-as-a-Service. Here are the current Fujitsu Biometrics-as-a-Service integrations in 2026:

  • 1
    Amazon Web Services (AWS)
    Amazon Web Services (AWS) is the world’s most comprehensive cloud platform, trusted by millions of customers across industries. From startups to global enterprises and government agencies, AWS provides on-demand solutions for compute, storage, networking, AI, analytics, and more. The platform empowers organizations to innovate faster, reduce costs, and scale globally with unmatched flexibility and reliability. With services like Amazon EC2 for compute, Amazon S3 for storage, SageMaker for AI/ML, and CloudFront for content delivery, AWS covers nearly every business and technical need. Its global infrastructure spans 120 availability zones across 38 regions, ensuring resilience, compliance, and security. Backed by the largest community of customers, partners, and developers, AWS continues to lead the cloud industry in innovation and operational expertise.
  • 2
    SAP Data Warehouse Cloud
    Connect data with business context and empower business users to unlock insights with our unified data and analytics cloud solution. SAP Data Warehouse Cloud unifies data and analytics in a cloud solution that includes data integration, database, data warehouse, and analytics capabilities to help you unleash the data-driven enterprise. Built on the SAP HANA Cloud database, this software-as-a-service (SaaS) empowers you to better understand your business data and make confident decisions based on real-time information. Connect data across multi-cloud and on-premises repositories in real-time while preserving the business context. Get insights on real-time data and analyze data with in-memory speed, powered by SAP HANA Cloud. Empower all users with self-service ability to connect, model, visualize and share their data securely, all in an IT governed environment. Leverage pre-built industry and LOB content, templates and data models.
  • 3
    SAP Data Intelligence
    Turn data chaos into data value with data intelligence. Connect, discover, enrich, and orchestrate disjointed data assets into actionable business insights at enterprise scale. SAP Data Intelligence is a comprehensive data management solution. As the data orchestration layer of SAP’s Business Technology Platform, it transforms distributed data sprawls into vital data insights, delivering innovation at scale. Provide your users with intelligent, relevant, and contextual insights with integration across the IT landscape. Integrate and orchestrate massive data volumes and streams at scale. Streamline, operationalize, and govern innovation driven by machine learning. Optimize governance and minimize compliance risk with comprehensive metadata management rules. Connect, discover, enrich, and orchestrate disjointed data assets into actionable business insights at enterprise scale.
    Starting Price: $1.22 per month
  • 4
    MSC Apex

    MSC Apex

    MSC Software

    Unified CAE environment for virtual product development. The team at GMTO is using MSC Apex to help the giant telescope withstand earthquakes in Chile while helping humanity understand the universe. Immerse yourself in a fun, easy to use environment; a game-like experience that is referred to by engineers as ‘addictive’. MSC Apex structures packages a user interface for scenario definition and results post-processing, as well as integrated solver methods. This solution is unique in that it combines computational parts and assemblies technology with a generative framework, which enables interactive and incremental analysis. The integration of the user interface with solver methods gives the user a unique ability to interactively and incrementally validate that FEM models are solver ready. At the user’s demand, a series of solver checks can be run against individual parts and assemblies and the model diagnostics are reported in the Analysis Readiness panel.
  • 5
    NetApp Virtual Storage Console
    NetApp Virtual Storage Console (VSC) for VMware vSphere is a vCenter Server plug-in that integrates with VMware environments to provide end-to-end lifecycle management for virtual machines utilizing NetApp storage systems. By offering visibility and management capabilities directly within the vCenter console, VSC enables administrators to perform tasks that enhance both server and storage efficiency. Key features include provisioning and cloning of datastores, optimization of ESXi host configurations according to NetApp best practices, and monitoring of storage performance and health. Additionally, VSC includes the VASA Provider for managing VMware Virtual Volumes (vVols) and the Storage Replication Adapter (SRA) for integration with VMware Site Recovery Manager, facilitating robust data protection and disaster recovery solutions.
  • 6
    SAP Internet of Things
    Leverage IoT-enriched business insights to embed in and extend business processes for transformative outcomes. The SAP Internet of Things solution offers capabilities to address industrial IoT use cases. As the IoT layer of SAP’s Business Technology Platform, it enables users to reimagine business processes and models with embedded IoT services and data. The SAP Internet of Things (SAP IoT) solution has a reference architecture that offers business services and specific capabilities to address critical industrial IoT use cases across manufacturing, supply chain, logistics, assets, products, service management, and more. Cloud service for building IoT applications and integration to business applications. Big Data that's built-in and managed. IoT data enriched with business context, rules, and event-driven integration framework. Analytical services with live integration to SAP Analytics Cloud.
  • 7
    ICONICS IoT
    Make your HMI/SCADA platform more accessible and efficient with the power of IoT. The Internet of Things (IoT) sees the world in a smart, interconnected way. Its vision is to connect assets, or “things”, to a larger IoT software system, or network of systems that make up a smart grid. These “things” retain the capability of actuation, control, automation and autonomous operation. The unification of devices results in vast amounts of data being collected, which empowers users with more opportunities than ever. ICONICS’ SCADA with IoT collects this data and provides the operator with a new layer of actionable intelligence. ICONICS IoT connects your buildings, facilities, and equipment through secure TLS encryption and Microsoft Azure. Your data in the cloud can be accessed from anywhere through pub/sub architecture for real-time visualization of KPI data at the edge. We deliver an efficient, secure connection to the cloud through bi-directional AMQP for Microsoft Azure.
  • 8
    SAP Data Services
    Maximize the value of all your organization’s structured and unstructured data with exceptional functionalities for data integration, quality, and cleansing. SAP Data Services software improves the quality of data across the enterprise. As part of the information management layer of SAP’s Business Technology Platform, it delivers trusted,relevant, and timely information to drive better business outcomes. Transform your data into a trusted, ever-ready resource for business insight and use it to streamline processes and maximize efficiency. Gain contextual insight and unlock the true value of your data by creating a complete view of your information with access to data of any size and from any source. Improve decision-making and operational efficiency by standardizing and matching data to reduce duplicates, identify relationships, and correct quality issues proactively. Unify critical data on premise, in the cloud, or within Big Data by using intuitive tools.
  • 9
    IRI CellShield
    IRI CellShield® protects the sensitive information in your Microsoft Excel® spreadsheets, allowing you to comply with data privacy laws. Point-and-click to protect your columns with reversible and non-reversible masking functions. CellShield keeps your data secure, whether it's in one sheet or a million. Use multiple search methods to find and report on PII across the LAN, and protect it all at once. Classify and mask it in intuitive graphical dialogs. CellShield's core technology is built on the award-winning IRI FieldShield data masking product for databases and flat files. Data masked in one platform can be revealed in another. CellShield EE is the only full-featured, professional data discovery, masking, and auditing package for Excel 2010, 2013, 2016, and 2019 (plus Office 365) workbooks in your LAN. CellShield EE exceeds the security and scope of a single password by combining and automating all these extra capabilities.
    Starting Price: $35 one-time payment
  • 10
    Pressidium

    Pressidium

    Pressidium

    World-class managed WordPress hosting engineered with unmatched industry-leading technology. DevOps support that goes beyond expectations and becomes an extension of your team. The highly sophisticated security architecture provides superior protection, exceeding industry standards by far. Say goodbye to stand-alone servers, VPS or containers. Every site on Pressidium runs on a load-balanced fleet of systems. Unlike others, we’re staffed with seasoned engineers. No first-level support agents, only humans, and not robots. Large organizations & corporations use our infrastructure to scale their WordPress sites with quality support and leading enterprise architecture. Pressidium® is an award-winning top-tier WordPress hosting platform, repeatedly achieving top positions in the review signal industry-standard benchmark. Pressidium® offers industrial-grade enterprise WordPress hosting with cutting-edge technology and a specialist DevOps support team.
    Starting Price: $21 per month
  • 11
    ABBYY Mobile Capture
    Mobile document capture and on-device text recognition. ABBYY Mobile Capture is an SDK that offers automatic data capture within your mobile app, providing real-time recognition and capturing photos of documents for on-device or back-end processing. A premium mobile onboarding process offers your customers a frictionless way to capture and provide self-servicing trailing documents to increase retention rates. Meet your customers’ expectations by minimizing manual interactions within your mobile apps and maximizing the ease-of-use for the end-user. Easy-to-integrate, pre-built, comprehensive mobile capture solution for your mobile application that saves development time and delivers best-quality results. Document processing and data capture with exceptional accuracy and ongoing learning continuously improves straight-through-processing rates. Automatically captures the best-quality image suitable for further back-end processing.
  • 12
    Stor2RRD
    Analyze key infrastructure performance metrics of your storage, SAN, and LAN devices. Optimize your mission-critical IT infrastructure. It provides a complete mapping overview through cloud, container, server virtualization, and database. Leading performance-monitoring solution thanks to unique web-based UI for graphical interpretation of performance utilization in a virtualized environment. You can find utilization of any attached storage in a simple graphical form comprehensible to anyone from technician to management level. Bring an easy solution to the market to improve the capacity planning of your highly virtualized environment with a simple and easily comprehensible UI. Stor2RRD provides performance, capacity, configuration, and status. Simply and quickly identify load abnormalities and locate problems at the infrastructure level.
  • 13
    Hyper Historian
    ICONICS’ Hyper Historian™ is an advanced 64-bit high-speed, reliable, and robust historian. Designed for the most mission-critical applications, Hyper Historian's advanced high compression algorithm delivers unparalleled performance with very efficient use of resources. Hyper Historian integrates with our ISA-95-compliant asset database and the latest big data technologies, including Azure SQL, Microsoft Data Lakes, Kafka, and Hadoop. This makes Hyper Historian the most efficient and secure real-time plant historian for any Microsoft operating system. Hyper Historian includes a module for automatic or manual insertion of data, empowering users to import historical or log data from databases, other historians, or intermittently connected field devices and equipment. This also provides for greatly increased reliability in capturing all data, even when network disruptions occur. Leverage rapid collection for enterprise-wide storage.
  • 14
    Ox Software

    Ox Software

    Ox, Inc.

    Ox is an order fulfillment solution that helps you get more out the door, faster. Fortune 500 retailers, grocers, and warehouses use Ox to optimize fulfillment operations by automating manual tasks like order routing to multiple facilities, generating optimized pickwalks, and managing inventory. Combine Ox's hands-free augmented reality technology to increase workforce efficiency, accuracy, and speed. Let Ox pull your supply chain into the future and implement Ox into all areas of fulfillment. Ox will pull your organization ahead of your competition. Seamlessly integrate with your organization’s current IT infrastructure. Aggregate orders, inventory, and facility map into one centralized platform to accelerate Units Picked Per hour and Exceed Customer Expectations. Leverage machine learning to automate the batching of orders, assignment of pick walks, and smart pick routing. Optimize speed, accuracy, and training through an augmented reality user interface.
  • 15
    Airlock

    Airlock

    Airlock

    Airlock's Secure Access Hub protects applications, APIs and data from identity theft and the most common attacks on Web applications. Security meets convenience, Airlock offers your customers a customer journey without media breaks with single sign-on, social registration, comprehensive user self-services and consent management. Acting in line with the market means reacting quickly. The Airlock Secure Access Hub therefore provides all important security functions such as registration, authentication and self services. So you can concentrate all your IT resources on your business processes. The Airlock Secure Access Hub helps to meet all international compliance standards - from GDPR over PSD2, PCI-DSS, OWASP to MAS. The upstream enforcement point for access policies onto applications and services allows compliance with regulations without having to make adjustments in each individual application.
  • 16
    Check Point Infinity
    Organizations frequently implement multiple cyber security solutions in pursuit of better protections. As a result, they are frequently left with a patchwork security architecture that results in a high TCO. By adopting a consolidated security approach with Check Point Infinity architecture, businesses realize preemptive protection against advanced fifth-generation attacks, while achieving a 50% increase in operational efficiency and 20% reduction in security costs. The first consolidated security architecture across networks, cloud, mobile and IoT, providing the highest level of threat prevention against both known and unknown cyber-threats. 64 different threat prevention engines blocking against known and unknown threats, powered by threat intelligence. Infinity-Vision is the unified management platform for Check Point Infinity, the first modern, consolidated cyber security architecture built to prevent today’s most sophisticated attacks across networks, cloud, endpoints, etc.
  • 17
    Check Point IPS

    Check Point IPS

    Check Point IPS

    Intrusion Prevention Systems detect or prevent attempts to exploit weaknesses in vulnerable systems or applications, protecting you in the race to exploit the latest breaking threat. Check Point IPS protections in our Next Generation Firewall are updated automatically. Whether the vulnerability was released years ago, or a few minutes ago, your organization is protected. Check Point IPS delivers thousands of signature and behavioral preemptive protections. Our acceleration technologies let you safely enable IPS. A low false positive rate saves your staff valuable time. Enable IPS on any Check Point security gateway reducing total cost of ownership. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely.
  • 18
    Hyperledger Sawtooth
    Hyperledger Sawtooth offers a flexible and modular architecture that separates the core system from the application domain, so smart contracts can specify the business rules for applications without needing to know the underlying design of the core system. Hyperledger Sawtooth supports a variety of consensus algorithms, including Practical Byzantine Fault Tolerance (PBFT) and Proof of Elapsed Time (PoET). Originally contributed by Intel, Sawtooth is a blockchain suite designed for versatility and scalability. Distributed Ledger Technology has potential in many fields with use cases from IoT to financials. This architecture recognizes the diversity of requirements across that spectrum. Sawtooth supports both permissioned and permissionless deployments. It includes a novel consensus algorithm, Proof of Elapsed Time (PoET). PoET targets large distributed validator populations with minimal resource consumption.
  • 19
    Hyperledger Iroha
    Hyperledger Iroha is designed to be simple and easy to incorporate into infrastructural or IoT projects requiring distributed ledger technology. Hyperledger Iroha features a simple construction, modular, domain-driven C++ design, emphasis on client application development and a new, crash fault tolerant consensus algorithm, called YAC. Hyperledger Iroha is a simple blockchain platform you can use to make trusted, secure, and fast applications by bringing the power of permission-based blockchain with Crash fault-tolerant consensus. It’s free, open-source, and works on Linux and Mac OS, with a variety of mobile and desktop libraries. Hyperledger Iroha is a general purpose permissioned blockchain system that can be used to manage digital assets, identity, and serialized data. This can be useful for applications such as interbank settlement, central bank digital currencies, payment systems, national IDs, and logistics, among others.
  • 20
    Hyperledger Indy

    Hyperledger Indy

    Hyperledger

    Hyperledger Indy provides tools, libraries, and reusable components for providing digital identities rooted on blockchains or other distributed ledgers so that they are interoperable across administrative domains, applications, and any other silo. Indy is interoperable with other blockchains or can be used standalone powering the decentralization of identity. Distributed ledger purpose-built for decentralized identity, correlation-resistant by design. DIDs (Decentralized Identifiers) that are globally unique and resolvable (via a ledger) without requiring any centralized resolution authority. Pairwise Identifiers create secure, 1:1 relationships between any two entities. Verifiable claims are interoperable format for exchange of digital identity attributes and relationships currently in the standardization pipeline at the W3C. Zero Knowledge Proofs which prove that some or all of the data in a set of Claims is true without revealing any additional information.
  • 21
    Hyperledger Besu

    Hyperledger Besu

    Hyperledger

    Hyperledger Besu is an Ethereum client designed to be enterprise-friendly for both public and private permissioned network use cases. It can also be ran on test networks such as Rinkeby, Ropsten, and Görli. Hyperledger Besu includes several consensus algorithms including PoW, and PoA (IBFT, IBFT 2.0, Etherhash, and Clique). Its comprehensive permissioning schemes are designed specifically for use in a consortium environment. Hyperledger Besu implements the Enterprise Ethereum Alliance (EEA) specification. The EEA specification was established to create common interfaces amongst the various open and closed source projects within Ethereum, to ensure users do not have vendor lock-in, and to create standard interfaces for teams building applications. Besu implements enterprise features in alignment with the EEA client specification. Hyperledger Besu implements various consensus algorithms which are involved in transaction validation, block validation, and block production.
  • 22
    SEA Manager
    SEA Manager (software environment analyzer) is an extremely powerful software analysis tool, that gives a full view of every application in your company as well as its interactions. SEA Manager is the cornerstone of many of Neperia Group’s services, providing our customers with countless possibilities to know, manage and improve their software. Combined with Neperia’s software insight portal, KPS Portal, SEA manager, gives you unprecedented control over every piece of software your business relies upon. SEA Manager works completely automatically, ensuring fast, complete and objective information. The insight it offers greatly helps to reduce the duration, costs and risks of knowledge rebuilding, migration, porting and re-engineering projects. No matter how complex your software is, Neperia’s SEA Manager offers countless advantages. It generates functional and technical documentation in MS Office formats and using graphic visualizations, customized to meet the needs of the customers.
  • 23
    Quantum VS-NVR Series
    Quantum offers a broad portfolio of network video recording servers to meet the needs of any surveillance environment, from a few cameras to hundreds of cameras. Each product is designed with the latest hardware to achieve the best performance at the best price, and to maximize the useful life of the products. The VS-NVR series is available in a variety of form factors, including mini-tower, 1U rack mount, 2U rack mount, and an ultra-dense 4U 60-bay rack mount server for recording and retaining footage from hundreds of cameras for months or years. Every product is backed by Quantum’s global support organization, providing installation and support 24/7/365 to tens of thousands of customers around the world. Designed with the latest hardware and operating systems to maximize the number of cameras each product can support. Each VS-NVR product was designed and specified to achieve the best performance at the lowest cost.
  • 24
    Zippin

    Zippin

    Zippin

    Zippin’s checkout-free technology platform is fast to deploy, highly accurate, and will delight your customers. The future of frictionless shopping is now. Customers want an easier shopping experience. Retailers want efficient operations and deeper insights. Zippin’s platform delivers both. Zippin is a leader in checkout-free technology. We opened one of the first checkout-free stores in the U.S. in San Francisco in the summer of 2018. We offer the best technology platform available to help retailers transform their operations and take advantage of the new opportunities offered by frictionless shopping. With precision sensors to recognize products and shopper behavior, advanced AI, faster deployment in stores, and advanced eCommerce-style insights, Zippin’s technology delivers a superior platform for checkout-free retail.
  • 25
    Open Container Initiative (OCI)

    Open Container Initiative (OCI)

    Open Container Initiative (OCI)

    The Open Container Initiative is an open governance structure for the express purpose of creating open industry standards around container formats and runtimes. Established in June 2015 by Docker and other leaders in the container industry, the OCI currently contains two specifications, the runtime specification (runtime-spec) and the image specification (image-spec). The runtime specification outlines how to run a “filesystem bundle” that is unpacked on disk. At a high-level an OCI implementation would download an OCI Image then unpack that image into an OCI Runtime filesystem bundle. At this point the OCI Runtime Bundle would be run by an OCI Runtime. The Open Container Initiative (OCI) is a lightweight, open governance structure (project), formed under the auspices of the Linux Foundation, for the express purpose of creating open industry standards around container formats and runtime. The OCI was launched on June 22nd 2015 by Docker, CoreOS and other leaders.
  • 26
    TestMatch

    TestMatch

    Astadia

    TestMatch is a transaction content comparison tool that provides automated testing of mainframe OLTP (terminal-based Online Transaction Processing applications). It can be used to facilitate the migration of such legacy applications to open systems, or it can provide an automated regression test suite for an application. All user interactions can be recorded centrally on an IBM or Siemens mainframe using standard tools (no client-side or server-side installation of Astadia's tools). Since recording is performed at the network level, it works regardless of the development technology. TestMatch visualizes test scenarios and sessions: this includes the terminal contents as well as all attributes that are typical for terminal-based applications, protected/editable, MDT bit, reverse-video, and colors. TestMatch can replay the recorded scenarios, either against the migrated application (as a migration testing tool) or against the original application (as a regression testing tool).
  • 27
    Windows Autopilot
    Windows Autopilot simplifies the way devices get deployed, reset, and repurposed, with an experience that is zero touches for IT. Unbox and turn on your Windows device. Windows Autopilot configures it from the cloud in a few steps. Windows Autopilot shows users how their configuration is progressing. Deliver a better user experience with personalization and a simple setup. Connect devices deployed with Windows Autopilot to Azure Active Directory (AD) and mobile device management. Make it easy for end users to set up new devices, without any IT involvement, using Windows Autopilot. Easily deploy the latest version of Windows 11 to existing devices with apps installed and profiles synched so users can resume work right away. Empower partners or IT staff to pre-provision Windows 11 devices to be fully configured and business-ready for organizations and users. Remove personal files, apps, and settings, and reapply the device’s original settings.
  • 28
    CompLions

    CompLions

    CompLions

    Save time and get a grip on your Risk & Compliance processes with 1 handy tool for every organization, regardless of industry or size. With our governance functionality you demonstrate that you handle your internal information security management with care and that you guarantee confidentiality, integrity and availability as laid down in ISO27001, NEN, NIST and BIO. With our tool you can monitor your GRC related problems. This way a lot of problems can be prevented and your company experiences control over the most important processes, the possible risks and consequences thereof. We make the handling of assessments from the management system and the selection of measures to control the risks clear and efficient. This gives you control and saves you time. You save time through smart deduplication of compliance, stricter quality requirements, standards, laws and regulations. Process assurance with the burden of proof towards your stakeholders.
  • Previous
  • You're on page 1
  • Next