SOLUTIONS CATALOGUE: IT Infrastructure |
Home | Catalogue Index | Supplier List | Product List | Airline Directory | Airline Events | Industry Links |
To Other Business Process Areas Hangar | Head Office | Operations and Consulting Services |
|
Find Solutions for IT Infrastructure |
Data Center | Information Security | Quality Assurance |
Feature Suppliers |
Data Center | ||
Data Base Systems | ||
IBM DB2 |
Multimedia, Web-ready relational database management system. |
|
IBM DB2 Content Management |
Managing, access and integrate critical business information. |
|
IBM IMS |
Transactional and hierarchical database management system. |
|
IBM Informix |
Data warehousing, analysis and reporting, Web content delivery, and broadcasting from a digital media library. |
|
IBM U2 |
High performance and scalable data management environments for embedding in vertical applications. |
|
Microsoft SQL Server |
Enterprise relational data base management and analysis system. |
|
Oracle Oracle 9i |
Full featured data base for web site, packaged applications, data warehouses or OLTP applications. |
|
Development & Modeling Tools | ||
Carmen Systems RAVE |
Carmen Rave is used as a legality, cost and quality modelling language and is accessible from all Carmen products. The language is specially designed for the transportation sector and to work effectively with advanced optimization. | |
JKCS | JKCS is a software service provider that leverages on a proven global delivery model in implementing avant-garde solutions. JKCS computes success by customer satisfaction. | |
Borland Delphi Studio |
Integrated solution for modelling, developing and deploying Windows solutions. |
|
IBM Object REXX |
Object-oriented programmming language |
|
Borland Delphi Studio |
Integrated solution for modelling, developing and deploying Windows solutions. |
|
IBM Object REXX |
Object-oriented programmming language |
|
Microsoft Visual FoxPro |
Data base tool for creating applications on the desktop and the web. |
|
Sabre Developer Tool |
Build applications that eliminate complex native host system transactions. |
|
Sparx Systems Enterprise Architect |
UML (Unified Modelling Language) design tool. |
|
Sybase Powerbuilder |
Rapid application development. |
|
Host Transaction Processing | ||
IBM CICS |
Customer Information Control System - Application servers and connectors that provide online transaction management and connectivity for mission-critical applications. |
|
IBM TPF |
Transaction Processing Facility - High volume transaction processing. |
|
Messaging | ||
Middleware | ||
Datalex BookIt! Matrix |
e-Business connectivity platform integrates internal and external booking and database facilities and multiple inventory sources. |
|
Networks | ||
Operating Systems | ||
IBM IBM AIX 5L |
||
IBM OS/390 |
||
IBM Linux at IBM |
||
IBM OS/400 V5R2 |
||
IBM z/OS |
||
Project Management Tools | ||
IBS Proficient |
Proficient allows scientific management and informed decision making for objective management of projects. It serves a wide spectrum of users in the organization right from the CEO to project managers, resource managers, finance managers, quality managers and team members.. View IBS Profile | |
Reporting Tools | ||
Crystal Decisions Crystal Reports |
High-productivity report creation and integration.
|
|
Storage Management | ||
Tivoli |
On demand computing data is highly available, protected, and restorable. |
|
Web Tools | ||
IBM WebSphere Studio |
Build and maintain Java™ 2 Platform, Enterprise Edition (J2EE) and Web services applications. |
|
Information Security | ||
Access Control and Authentication | ||
Unisys Stealth Products and Services |
Unisys Stealth: enables trusted identities to access microsegmented critical assets that can safely communicate through secure, encrypted channels. Stealth™ establishes irrefutable user authentication, prevents lateral attacker movement and reduces data center, mobile and cloud attack surfaces. | |
Anti Virus | ||
McAfee | ||
Biometrics | ||
Iridian Technologies Iris Recognition |
Iris recognition security system. |
|
Cryptographic Control Tools | ||
Data Base Security | ||
Check Point Data Security |
Data protection for laptops, PCs, removable media and mobile devices. | |
Next Generation Security (NGS) Software Ltd NGSSQuirreL |
A comprehensive database security assessment scanner for database vulnerability assessment, compliance and verification. | |
Firewall | ||
Check Point Firewall |
Protects the entire network infrastructure and information with a unified security architecture. | |
Cisco Systems PIX |
Delivers robust user and application policy enforcement, multivector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. | |
Intrusion Prevention and Detection Systems | ||
Risk, Threat and Vulnerability Management | ||
Unisys Managed Security Services |
Managed Security Services: deliver comprehensive real-time protection solutions – Security Information and Event Management (SIEM), Security Device Management (SDM), Governance Risk & Compliance (GRC), Managed Identity and Access Management Services (IAM); and Stealth Services, helping organizations to manage overall risk, improve their security posture, prevent emerging threats and demonstrate compliance in a cost-effective manner. | |
Security Consulting Services | ||
Unisys Security Consulting Services |
Cybersecurity Analytics Consulting: helps quickly identify threats and prioritize actions. Leveraging the Unisys Cybersecurity Intelligence platform—which combines innovative machine learning security, behavioral analytics and an advanced threat intelligence engine. | |
Quality Assurance | ||
Network Vulnerbility Management | ||
Qualys Qualysguard Enterprise |
Discover all devices and applications across the network, and identify and eliminate the security threats that make network attacks possible. | |
Tenable Network Security Nessus |
||
Source Code Scanning | ||
Coverity, Inc. Prevent |
Allows development teams to deliver superior-quality code, improve development processes and speed time to market for critical software systems. |
|
Web Application Security - Vulnerability Scanning | ||
Acunetix Web Vulnerability Scanner |
Audit your website security with Acunetix Web Security Scanner | |
Cenzic Hailstorm |
Automatically analyzes your Company’s Web application security status across the enterprise. | |
Compuware DevPartner |
Automatically detects and diagnoses software defects and performance problems early in the development process, providing built-in expert coding advice, coding standards and best practices to improve development skills and ensure software reliability and performance | |
Fortify Software Fortify 360 |
Fortify 360 is an integrated solution for identifying, prioritizing and repairing security vulnerabilities in software and managing the business of assuring application security. | |
N-Stalker N-Stalker Web Application Security Scanner |
N-Stalker is capable of sweeping your Web Application for a large number of vulnerabilities common to this environment, including Cross-site Scripting and SQL injection, Buffer Overflow and Parameter Tampering attacks and much more. | |
Ounce Labs, Inc. | Ounce Labs’ solutions enable organizations to identify, prioritize and eliminate business risk to the enterprise caused by software security vulnerabilities. | |
Security Metrics Vulnerability Assessment Module |
||
SPIDynamics (HP) Web Inspect |
Web application security assessment throughout the life cycle | |
Watchfire (IBM) Appscan |
Watchfire provides web application security software that pinpoints critical vulnerabilities and helps manage the process of fixing them. | |
WhiteHat Sentinel |
Identify and manage website vulnerabilities, in both production and QA environments, to find those holes before hackers do. | |
Web Testing | ||
Parasoft WebKing |
WebKing is an automated Web testing suite that provides comprehensive testing and analysis of Web sites and Web applications to ensure they meet the reliability, security, and performance goals necessary to effectively support business requirements. | |
To Other Business Process Areas Hangar | Head Office | Operations and Consulting Services |
Can't find a Supplier or Product that matches your requirements in the Catalogue? Contact us and we will do a customized Market Search. CLICK HERE to get an airlinetechnology.net Consultant to help with your project. |
Copyright 2018 © airlinetechnology.net
|