To Airline Technology.net Home Page
SOLUTIONS CATALOGUE: IT Infrastructure

Site Search
Find Solutions for IT Infrastructure
 
Feature Suppliers
To FGI Profile To Unisys Web Site
Data Center
Data Base Systems
IBM
DB2
Multimedia, Web-ready relational database management system.
 
IBM
DB2 Content Management
Managing, access and integrate critical business information.
 
IBM
IMS
Transactional and hierarchical database management system.
 
IBM
Informix
Data warehousing, analysis and reporting, Web content delivery, and broadcasting from a digital media library.
 
IBM
U2
High performance and scalable data management environments for embedding in vertical applications.
 
Microsoft
SQL Server
Enterprise relational data base management and analysis system.
 
Oracle
Oracle 9i
Full featured data base for web site, packaged applications, data warehouses or OLTP applications.
 
Development & Modeling Tools
Carmen Systems

RAVE
Carmen Rave is used as a legality, cost and quality modelling language and is accessible from all Carmen products. The language is specially designed for the transportation sector and to work effectively with advanced optimization.
To Carmen Systems RAVE Section
JKCS JKCS is a software service provider that leverages on a proven global delivery model in implementing avant-garde solutions. JKCS computes success by customer satisfaction.
To JKCS web site
Borland
Delphi Studio
Integrated solution for modelling, developing and deploying Windows solutions.
 
IBM
Object REXX
Object-oriented programmming language
 
Borland
Delphi Studio
Integrated solution for modelling, developing and deploying Windows solutions.
 
IBM
Object REXX
Object-oriented programmming language
 
Microsoft
Visual FoxPro
Data base tool for creating applications on the desktop and the web.
 
Sabre
Developer Tool
Build applications that eliminate complex native host system transactions.
 
Sparx Systems
Enterprise Architect
UML (Unified Modelling Language) design tool.
 
Sybase
Powerbuilder
Rapid application development.
 
Host Transaction Processing
IBM
CICS
Customer Information Control System - Application servers and connectors that provide online transaction management and connectivity for mission-critical applications.
 
IBM
TPF
Transaction Processing Facility - High volume transaction processing.
 
Messaging
 
 
Middleware
Datalex
BookIt! Matrix
e-Business connectivity platform integrates internal and external booking and database facilities and multiple inventory sources.
 
Networks
 
 
Operating Systems
IBM
IBM AIX 5L
 
IBM
OS/390
 
IBM
Linux at IBM
 
IBM
OS/400 V5R2
 
IBM
z/OS
 
Project Management Tools
IBS

Proficient
Proficient allows scientific management and informed decision making for objective management of projects. It serves a wide spectrum of users in the organization right from the CEO to project managers, resource managers, finance managers, quality managers and team members.. View IBS Profile
To IBS web site
Reporting Tools
Crystal Decisions
Crystal Reports
High-productivity report creation and integration.

 
Storage Management

IBM

Tivoli

On demand computing data is highly available, protected, and restorable.
 
Web Tools
IBM
WebSphere Studio
Build and maintain Java™ 2 Platform, Enterprise Edition (J2EE) and Web services applications.
 
Information Security
Access Control and Authentication
Unisys


Stealth Products and Services
Unisys Stealth: enables trusted identities to access microsegmented critical assets that can safely communicate through secure, encrypted channels. Stealth™ establishes irrefutable user authentication, prevents lateral attacker movement and reduces data center, mobile and cloud attack surfaces. To Unisys Web Site
Anti Virus
McAfee    
Biometrics
Iridian Technologies
Iris Recognition
Iris recognition security system.
 
Cryptographic Control Tools
     
Data Base Security
Check Point
Data Security
Data protection for laptops, PCs, removable media and mobile devices.  
Next Generation Security (NGS) Software Ltd
NGSSQuirreL
A comprehensive database security assessment scanner for database vulnerability assessment, compliance and verification.  
Firewall
Check Point
Firewall
Protects the entire network infrastructure and information with a unified security architecture.  
Cisco Systems
PIX
Delivers robust user and application policy enforcement, multivector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions.  
Intrusion Prevention and Detection Systems
     
Risk, Threat and Vulnerability Management
Unisys


Managed Security Services
Managed Security Services: deliver comprehensive real-time protection solutions – Security Information and Event Management (SIEM), Security Device Management (SDM), Governance Risk & Compliance (GRC), Managed Identity and Access Management Services (IAM); and Stealth Services, helping organizations to manage overall risk, improve their security posture, prevent emerging threats and demonstrate compliance in a cost-effective manner. To Unisys Web Site
Security Consulting Services
Unisys


Security Consulting Services
Cybersecurity Analytics Consulting: helps quickly identify threats and prioritize actions. Leveraging the Unisys Cybersecurity Intelligence platform—which combines innovative machine learning security, behavioral analytics and an advanced threat intelligence engine. To Unisys Web Site
Quality Assurance
Network Vulnerbility Management
Qualys
Qualysguard Enterprise
Discover all devices and applications across the network, and identify and eliminate the security threats that make network attacks possible.  
Tenable Network Security
Nessus
 
Source Code Scanning
Coverity, Inc.
Prevent
Allows development teams to deliver superior-quality code, improve development processes and speed time to market for critical software systems.
 
Web Application Security - Vulnerability Scanning
Acunetix
Web Vulnerability Scanner
Audit your website security with Acunetix Web Security Scanner  
Cenzic
Hailstorm
Automatically analyzes your Company’s Web application security status across the enterprise.  
Compuware
DevPartner
Automatically detects and diagnoses software defects and performance problems early in the development process, providing built-in expert coding advice, coding standards and best practices to improve development skills and ensure software reliability and performance  
Fortify Software
Fortify 360
Fortify 360 is an integrated solution for identifying, prioritizing and repairing security vulnerabilities in software and managing the business of assuring application security.  
N-Stalker
N-Stalker Web Application Security Scanner
N-Stalker is capable of sweeping your Web Application for a large number of vulnerabilities common to this environment, including Cross-site Scripting and SQL injection, Buffer Overflow and Parameter Tampering attacks and much more.  
Ounce Labs, Inc. Ounce Labs’ solutions enable organizations to identify, prioritize and eliminate business risk to the enterprise caused by software security vulnerabilities.  
Security Metrics
Vulnerability Assessment Module
   
SPIDynamics (HP)
Web Inspect
Web application security assessment throughout the life cycle  
Watchfire (IBM)
Appscan
Watchfire provides web application security software that pinpoints critical vulnerabilities and helps manage the process of fixing them.  
WhiteHat
Sentinel
Identify and manage website vulnerabilities, in both production and QA environments, to find those holes before hackers do.  
Web Testing
Parasoft
WebKing
WebKing is an automated Web testing suite that provides comprehensive testing and analysis of Web sites and Web applications to ensure they meet the reliability, security, and performance goals necessary to effectively support business requirements.  
   
 
Can't find a Supplier or Product that matches your requirements in the Catalogue?
Contact us and we will do a customized Market Search.
CLICK HERE to get an airlinetechnology.net Consultant to help with your project.