What Integrates with Oracle Solaris?
Find out what Oracle Solaris integrations exist in 2025. Learn what software and services currently integrate with Oracle Solaris, and sort them by reviews, cost, features, and more. Below is a list of products that Oracle Solaris currently integrates with:
-
1
RunMyJobs by Redwood
RunMyJobs by Redwood
238 RatingsRunMyJobs by Redwood is the only SAP endorsed and premium-certified and the most awarded SAP-certified SaaS workload automation platform and only allowing enterprises to achieve end-to-end IT process automation and unify complex across any application, system or environment without limits and with high availability as you scale. We're the #1 job scheduling choice for SAP customers with seamless integration to S/4HANA, BTP, RISE, ECC and more while maintaining a clean core. Empower teams with seamless integration with any present and future tech stack, a low-code editor and a rich library of templates. Monitor processes in real-time with predictive SLA management and get proactive notifications via email or SMS on performance issues or delays in all your processes. Redwood team provides 24/7/365 day global support with the industry’s strongest SLAs and 15-minute response times and a proven approach to migration that secures continuous operations, including team training, on-demand learning and more. -
2
With more than 50,000 customer installations across the five continents, Pandora FMS is a truly all-in-one monitoring solution, covering all traditional silos for specific monitoring: servers, networks, applications, logs, synthetic/transactional, remote control, inventory, etc. Pandora FMS allows you to quickly find and solve problems. It scales them so that they can be derived either from on-premise, multi-cloud, or both. You now have the ability to use your entire IT stack and analytics to solve any problem, even those that are difficult to find. You can control and manage any technology and application with more than 500 plugins, including SAP, Oracle, Lotus or Citrix, Jboss, VMware, AWS and SQL Server.
-
3
IRI CoSort
IRI, The CoSort Company
$4,000 perpetual useFor more four decades, IRI CoSort has defined the state-of-the-art in big data sorting and transformation technology. From advanced algorithms to automatic memory management, and from multi-core exploitation to I/O optimization, there is no more proven performer for production data processing than CoSort. CoSort was the first commercial sort package developed for open systems: CP/M in 1980, MS-DOS in 1982, Unix in 1985, and Windows in 1995. Repeatedly reported to be the fastest commercial-grade sort product for Unix. CoSort was also judged by PC Week to be the "top performing" sort on Windows. CoSort was released for CP/M in 1978, DOS in 1980, Unix in the mid-eighties, and Windows in the early nineties, and received a readership award from DM Review magazine in 2000. CoSort was first designed as a file sorting utility, and added interfaces to replace or convert sort program parameters used in IBM DataStage, Informatica, MF COBOL, JCL, NATURAL, SAS, and SyncSort. In 1992, CoSort added related manipulation functions through a control language interface based on VMS sort utility syntax, which evolved through the years to handle structured data integration and staging for flat files and RDBs, and multiple spinoff products. -
4
Asterisk
Sangoma Technologies
FreeAsterisk is a versatile open-source framework designed for creating various communication applications. It transforms a standard computer into a robust communications server. Asterisk serves as the backbone for IP PBX systems, VoIP gateways, conference servers, and numerous other tailored solutions. Its users range from small enterprises to large corporations, call centers, telecom carriers, and government bodies across the globe. Available at no cost, Asterisk thrives under the sponsorship of Sangoma. Currently, over a million Asterisk-based communication systems operate in more than 170 nations. Remarkably, nearly all companies listed in the Fortune 1000 utilize Asterisk in some capacity. Most frequently implemented by system integrators and developers, Asterisk can serve as the foundation for a comprehensive business phone system or can be employed to augment an existing setup or connect disparate systems. Whether you're interested in crafting a personalized system with Asterisk or purchasing an efficient, affordable turnkey solution, explore the options available to determine the best fit for your needs. With its flexibility and wide-ranging applications, Asterisk continues to evolve, ensuring it meets the demands of modern communication. -
5
IRI FieldShield
IRI, The CoSort Company
IRI FieldShield® is a powerful and affordable data discovery and de-identification package for masking PII, PHI, PAN and other sensitive data in structured and semi-structured sources. Front-ended in a free Eclipse-based design environment, FieldShield jobs classify, profile, scan, and de-identify data at rest (static masking). Use the FieldShield SDK or proxy-based application to secure data in motion (dynamic data masking). The usual method for masking RDB and other flat files (CSV, Excel, LDIF, COBOL, etc.) is to classify it centrally, search for it globally, and automatically mask it in a consistent way using encryption, pseudonymization, redaction or other functions to preserve realism and referential integrity in production or test environments. Use FieldShield to make test data, nullify breaches, or comply with GDPR. HIPAA. PCI, PDPA, PCI-DSS and other laws. Audit through machine- and human-readable search reports, job logs and re-ID risks scores. Optionally mask data when you map it; FieldShield functions can also run in IRI Voracity ETL and federation, migration, replication, subsetting, and analytic jobs. To mask DB clones run FieldShield in Windocks, Actifio or Commvault. Call it from CI/CD pipelines and apps. -
6
pygame
pygame
FreePygame is a collection of Python modules specifically created for developing video games. By building upon the robust SDL library, Pygame empowers developers to craft comprehensive games and multimedia applications using the Python programming language. This library is remarkably versatile, functioning seamlessly across a wide range of platforms and operating systems. Moreover, Pygame is available for free, distributed under the LGPL license, permitting the development of open-source, freeware, shareware, and commercial games. As multi-core CPUs become increasingly common, leveraging these processors enables developers to enhance their game's performance significantly. Certain Pygame functions can release the notorious Python Global Interpreter Lock (GIL), achieving performance improvements typically associated with C code. The library employs optimized C and assembly code for its fundamental operations, resulting in performance enhancements, with C code often being 10 to 20 times faster than standard Python code, while assembly can surpass Python by over 100 times. Pygame is easily accessible on various operating systems, requiring only a simple installation command such as apt-get, emerge, or pkg_add to get started. This accessibility and performance scalability make it an attractive choice for both novice and experienced developers alike. -
7
OpenSVC
OpenSVC
FreeOpenSVC is an innovative open-source software solution aimed at boosting IT productivity through a comprehensive suite of tools that facilitate service mobility, clustering, container orchestration, configuration management, and thorough infrastructure auditing. The platform is divided into two primary components: the agent and the collector. Acting as a supervisor, clusterware, container orchestrator, and configuration manager, the agent simplifies the deployment, management, and scaling of services across a variety of environments, including on-premises systems, virtual machines, and cloud instances. It is compatible with multiple operating systems, including Unix, Linux, BSD, macOS, and Windows, and provides an array of features such as cluster DNS, backend networks, ingress gateways, and scalers to enhance functionality. Meanwhile, the collector plays a crucial role by aggregating data reported by agents and retrieving information from the site’s infrastructure, which encompasses networks, SANs, storage arrays, backup servers, and asset managers. This collector acts as a dependable, adaptable, and secure repository for data, ensuring that IT teams have access to vital information for decision-making and operational efficiency. Together, these components empower organizations to streamline their IT processes and maximize resource utilization effectively. -
8
Melissa Data Quality Suite
Melissa
Industry experts estimate that as much as 20 percent of a business's contact information may be inaccurate, leading to issues such as returned mail, costs for address corrections, bounced emails, and inefficient marketing and sales endeavors. To address these challenges, the Data Quality Suite offers tools to standardize, verify, and correct contact information including postal addresses, email addresses, phone numbers, and names, ensuring effective communication and streamlined business processes. It boasts the capability to verify, standardize, and transliterate addresses across more than 240 countries, while also employing advanced recognition technology to identify over 650,000 ethnically diverse first and last names. Furthermore, it allows for the authentication of phone numbers and geo-data, ensuring that mobile numbers are active and reachable. The suite also validates domain names, checks syntax and spelling, and even conducts SMTP tests for comprehensive global email verification. By utilizing the Data Quality Suite, organizations of any size can ensure their data is accurate and up-to-date, facilitating effective communication with customers through various channels including postal mail, email, and phone calls. This comprehensive approach to data quality can significantly enhance overall business efficiency and customer engagement. -
9
NXLog
NXLog
Achieve unparalleled security observability by leveraging insightful data from your logs. Enhance the visibility of your infrastructure while bolstering threat prevention through a flexible, multi-platform solution. With compatibility spanning over 100 operating system versions and more than 120 customizable modules, you can obtain extensive insights and strengthen your overall security posture. Significantly lower the expenses associated with your SIEM solution by effectively minimizing noisy and redundant log data. By filtering events, truncating unnecessary fields, and eliminating duplicates, you can substantially improve the quality of your logs. Unify the collection and aggregation of logs from all systems within your organization using a single, comprehensive tool. This approach simplifies the management of security-related events and accelerates both detection and response times. Additionally, empower your organization to fulfill compliance obligations by centralizing specific logs within a SIEM while archiving others for long-term retention. The NXLog Platform serves as an on-premises solution designed for streamlined log management, offering versatile processing capabilities to meet diverse needs. This powerful tool not only enhances security efficiency but also provides a streamlined approach to managing extensive log data. -
10
SDS E-Business Server
Software Diversified Services
SDS is now engaged in the distribution, support, and active enhancement of the well-regarded E-Business Server, a genuine OpenPGP encryption solution that was initially created by cryptography innovator Phil Zimmerman. By leveraging OpenPGP encryption technology along with adaptable APIs, the SDS E-Business Server delivers robust encryption capabilities that seamlessly integrate with a diverse array of applications and platforms, including mainframes. This server is tailored for organizations that demand top-tier security for data that is stored internally, shared within the organization, and transmitted outside its protective boundaries. The complexities of modern data security requirements are significant yet essential. Achieve compliance with GDPR and other critical standards through the use of invulnerable signature generation and dependable authentication methods, ensuring your data is secure. Notably, the E-Business Server also optimizes file sizes, minimizes bandwidth usage, accelerates processing times, and conserves disk space, allowing for efficient resource management. As the digital landscape evolves, organizations must prioritize solutions that not only enhance security but also streamline operations for improved productivity. -
11
AD Bridge
BeyondTrust
Enhance the capabilities of Microsoft® Active Directory by incorporating authentication, single sign-on, and group policy management for Unix and Linux systems through AD Bridge, ensuring uniformity in tools used across the organization. This integration offers a cohesive toolset to oversee both Windows and Unix/Linux systems effectively, simplifying compliance efforts and delivering comprehensive audit records for compliance and auditing teams. Additionally, it facilitates centralized management of group policies while strengthening security protocols. By broadening the reach of single sign-on (SSO) and file-sharing capabilities, it also provides robust control over access to non-Windows systems. BeyondTrust AD Bridge centralizes authentication processes for Unix and Linux by leveraging Active Directory’s Kerberos authentication and SSO features. Furthermore, it extends group policy functionalities to non-Windows platforms, streamlining configuration management and mitigating the risks associated with diverse environments. This extension of native group policy management tools allows administrators to include specific settings tailored for Unix and Linux, enhancing operational efficiency. As a result, organizations can achieve a higher level of integration and security across their entire IT infrastructure. -
12
TABEX4
BOI Software
TABEX4 is compatible with all major operating systems, making it a versatile solution for use across the entire organization, including both mainframe and server environments. It allows for the efficient and secure management of tables, regardless of the underlying platform or database utilized. With TABEX4, you can easily import table data from various software applications and memory forms using streamlined APIs. Additionally, exporting data is flexible, providing options such as PDF, email, and various storage formats. For those seeking answers, our TABEX4 FAQs deliver a comprehensive overview of essential topics related to the software. Meanwhile, the TABEX4 Wiki serves as a valuable resource for acquiring expert insights into technical issues and challenges you may face. To ensure a seamless experience during public audits, TABEX4 emphasizes utmost transparency and security in handling both master and control data. Furthermore, the TABEX4 Relational Bridge enhances the software by integrating interfaces with relational databases, thereby making all TABEX4 functionalities accessible to RDBs. With these features, TABEX4 stands out as a powerful tool for data management and compliance. -
13
smartmontools
smartmontools
The smartmontools suite includes two key utilities, smartctl and smartd, designed to manage and oversee storage systems through the self-monitoring, analysis, and reporting technology integrated into the majority of contemporary ATA/SATA, SCSI/SAS, and NVMe drives. These tools often alert users to potential disk degradation and failure before they occur, offering invaluable preventative measures. Originally based on the Linux smartsuite package, smartmontools is compatible with ATA/SATA, SCSI/SAS, and NVMe drives, as well as SCSI/SAS tape devices. It is versatile enough to operate on a wide range of platforms, including modern versions of Linux, FreeBSD, NetBSD, OpenBSD, Darwin (macOS), Solaris, Windows, Cygwin, OS/2, eComStation, and QNX. Additionally, smartmontools can also be utilized from various live CDs/DVDs, enhancing its accessibility for users who may need it in different environments. This broad compatibility makes it a valuable tool for anyone looking to ensure the health and longevity of their storage systems. -
14
Oracle Cloud Marketplace
Oracle
Oracle Cloud Marketplace serves as a digital hub where businesses can find an extensive array of third-party applications and services designed to operate on Oracle Cloud Infrastructure. This platform allows users to conveniently access software solutions that are fully compatible with Oracle Cloud services, featuring offerings like automated Terraform stacks, pre-configured ISV compute images, and containerized applications. Companies benefit from various flexible consumption models, including free options, Bring Your Own License (BYOL), and pay-as-you-go plans, allowing them to select the most suitable payment approach for their specific requirements. By facilitating automated, comprehensive solutions, Oracle Cloud Marketplace streamlines the deployment process, helping enterprises effectively scale their applications and improve overall operational efficiency. Ultimately, this marketplace enhances the user experience by providing a diverse selection of tools tailored to meet the evolving demands of modern businesses. -
15
Catalogic DPX
Catalogic Software
Efficient, swift, and budget-friendly solutions for data backup and recovery. Safeguard and retrieve your information from accidental deletions, natural calamities, and cyber threats like ransomware. Experience rapid restoration directly from disk, tape, or cloud sources. Our agentless backup system enhances virtual environments, offering the ability to recover individual files or entire directories from VMware and Microsoft Hyper-V without the need for agents. Furthermore, improvements to vStor, our innovative software-defined backup appliance, now include configuration management through an HTML5 interface, streamlined replication processes, and S3 Object Lock functionality to secure cloud backups from premature deletions and ransomware attacks. Additionally, we have expanded our cloud storage backup and archiving options to include Backblaze B2 Cloud Storage with S3 Object Lock, along with support for Amazon S3 Glacier and Glacier Deep Archive, ensuring robust protection for your critical data assets. With these advancements, you can rest assured that your backup and recovery processes are more resilient than ever.
- Previous
- You're on page 1
- Next