An interactive e-Learning software platform to manage rapid content development, increase user adoption and accelerate ROI.
Govern application lifecycle activities to ensure alignment with business objective and quality standard.
High-quality application delivery at enterprise scale. For Agile, Hybrid or Traditional teams.
Continuous deployment solution providing automation and release management
ArcSight ESM is a comprehensive security information and event management solution that identifies and prioritize threats in real time so you can respond and remediate quickly.
A comprehensive threat detection, analysis, and compliance management SIEM solution
ArcSight Intelligence augments existing security tools and empowers security operations teams to identify and respond to the threats that matter.
Advanced Behavioral Analytics tool for CrowdStrike that empowers security operations teams to find and respond to insider & advanced persistent threats before it’s too late.
A comprehensive log management solution for easier compliance, efficient log search, and secure cost-effective storage.
Implement a SIEM log management solution created for security analytics, investigation, and compliance.
A future-ready, open platform that transforms data chaos into security insight
ATAR Labs was acquired by Micro Focus in 2020, and in 2023, Micro Focus was acquired by OpenText. Learn more.
Brand Reputation Monitoring and Protection – Powered by IDOL
Proactively monitors processes to find performance issues before they affect users. BPM is now included as an optional component within Operations Bridge.
Monitoring, capacity and performance management for virtualized environments
Helping organizations meet data privacy regulatory guidelines through the management & disposition of data.
Flexible enterprise content management software - in the cloud, delivered in a SaaS model.
Automate enterprise-scale provisioning, patching, and compliance across servers, databases, and middleware.
A modern backup protection solution, ensuring disaster recovery and fast ransomware restore for Microsoft 365, containers, hypervisors, and cloud platforms.
Automate tasks like provisioning and configuring, compliance, patching, and release management for databases and application servers.
Connect Dev and Ops by automating the deployment pipeline and reduce feedback time
Respond to litigation and investigations quickly, accurately, & cost-effectively
Email, Social, and Team Collaboration provides a single, integrated software ecosystem that offers everything your teams need to stay connected.
Software that automates the monitoring of employee communications to meet regulatory, compliance, and internal risk-mitigation initiatives.
Manage your mobile and traditional endpoint devices anywhere, with Unified Endpoint Management
Identify missing software patches and applicable CVEs, automate patch delivery with policies.
Provides email, instant messaging, and collaboration for your enterprise, while also managing security, archiving, and recovery.
Automates an extensive set of management tasks through identity- and target-driven policies
File Reporter for OES examines OES network file systems and delivers detailed file storage intelligence.
Fortify on Demand Mobile Application Security service enables organizations to assess and remediate vulnerabilities and manage risk quickly, without the need for in-house security teams and expertise.
Discover the integrated, best-in-class solution for custom and open source code security powered by Fortify and Sonatype.
Gain valuable insight with a centralized management repository for scan results
Backup and disaster recovery solution that ensures critical data is always available
Evaluate the health of GroupWise systems with customizable monitoring and reporting tools.
GWAVA software is now a part of Micro Focus and all products and information previously on GWAVA.com are now on Microfocus.com
Optimize your cloud costs. Cut waste and control spend with Micro Focus HCMX FinOps Express.
DevOps driven, multi-cloud management and orchestration for any cloud, container, or infrastructure
Easier and enhanced multi cloud management. Deploy business customized solutions with flexibility and speed.
Application containerization & application streaming improves organizational remote work & remote learning
File filtering and transformation software that extracts text, metadata, and other relevant properties from over 1,000 file formats on numerous platforms.
Digital forensics for organizations processing video and image evidence who need to identify and extract facts during an investigation – Powered by IDOL.
Cross-enterprise performance testing for multiple and concurrent testing projects
Data aggregation and indexing technology that connects to virtually all systems – enterprise and the cloud – regardless of file type or language.
Natural Language Q&A and Chatbot by IDOL
Extend the power of Active Directory authentication, authorization and policy to Linux resources.
Move beyond username and passwords and securely protect data and applications
Learn how Advanced Authentication Connector for z/OS is a multi-factor authentication for all your IBM z/OS end points
Expand identity and access management (IAM) to include unstructured data.
Limits administrative privileges and restricts directory views to specific users
The foundation for the world's largest identity management deployments, and an integral part of Identity Manager. It provides centralized identity management, infrastructure, security, and scalability to all types of applications running behind and beyond the firewall.
Edit, test, and review Group Policy Object changes before implementation.
Provides automated user access review and recertification to remain compliant
Delivers an intelligent identity management framework to service your enterprise
Monitors user activity in key systems and takes corrective actions in case of non-compliant or suspicious behaviors.
A lightweight proxy server that acts as a middleware layer between LDAP clients and LDAP directory servers for load balancing, fail-over, centralized auditing, and more.
Control and record which privileged users have access to what. You centrally define the commands that privileged users are able to execute on any UNIX, Linux or Windows platform.
Secure and manage APIs of any kind - cloud, SaaS, web-services, micro-services, or IoT.
Finds and repairs configuration errors that lead to security breaches or downtime.
Provides easy compliance auditing and real-time protection for IBM iSeries systems.
Simplifies and speeds up the development and delivery of Identity Manager by letting deployment teams verify the driver action for new and updated drivers automatically, rather than through laborious manual testing.
Drive automated configuration, change and security compliance across your enterprise network. The capabilities of Network Automation are also included in Network Operations Management.
Unifies fault, availability, and performance monitoring for networks. The capabilities of Network Node Manager i are also included in Network Operations Management.
Monitor, manage, troubleshoot, automate, and ensure compliance for traditional, virtual, and software-defined networks (SDN). Network Operations Management includes the functionality of Network Node Manager i, Network Automation, and more.
Open Enterprise Server enables your organization to make file and print services more efficient without adding more administration.
See how Select Enterprise works and get answers on how this benefits your organization.
Seven essential tools to build IT infrastructures, including secure file sharing
Vertica Analytics Database is the leading unified analytics warehouse and data lake
Accelerate, monitor, and orchestrate digital value streams
AIOps for Cloud Monitoring - Automated event and performance monitoring for multi-cloud and on-premises environments as well as complete application health management including synthetic and real user application monitoring and diagnostics. The capabilities of Business Process Monitor, Real User Monitor, and Diagnostics are included in Operations Bridge.
An operational intelligence solution leveraging machine learning to identify hidden insights in system silos, helping IT resolve root cause of failures faster, and improve performance with prediction
Integration of Operations Bridge to many 3rd party monitoring and ticketing tools. Customers download here.
Integration of Operations Bridge to many 3rd party monitoring and ticketing tools. Partners download here.
Operations Bridge Manager (OBM) is the core component of the Operations Bridge, it automatically discovers and correlates data, event topology, and metrics. Data comes from agents and connectors.
A service management solution that delivers a holistic view of mixed IT environment
Operations OS Instance license passwords enable the OM Agent functionality. Some OS Instance license passwords also contain Performance Agent functionality. This agent must be associated with the Operations Bridge Manager trial software.
Standardize and manage project and portfolio activities for real-time decisions
Real user monitoring to detect, triage, and isolate end user performance issues in production. RUM is now included as an optional component within Operations Bridge.
Centralized planning and control for the entire software release lifecycle.
Archive Office 365, Exchange, Gmail, and GroupWise data in one central location for quick, easy access to critical business data.
Secure, encrypted messaging and archiving for iOS, Android, and BlackBerry devices.
Ensure your social media communication data is compliant by archiving all social media data into one central repository.
Archive all business communication for case assessment, search, and eDiscovery.
Protect your network and messaging system from malware, viruses, and harmful content
A Security Information and Event Management (SIEM) solution that simplifies the deployment, management, and day-to-day use of SIEM.
Fast and easy ITIL-based help desk solution for small to medium sized organizations looking for ITSM service management.
Machine learning-based ITSM and ESM software to meet all your service desk and IT service management needs.
The extensible and scalable service desk solution built on machine learning, analytics and automation.
Dev and test faster with app simulation software that simulates service behavior.
Automated software load, stress, and performance testing in an open and sharable model.
Agentless application monitoring that provides heterogeneous and hybrid support, and quick time to value with easy installation and configuration.
These Social Collaboration tools help streamline archiving compliance and supervision of your employee's business communication. Learn more here.
Mitigate risk across social media channels to meet regulatory compliance obligations.
Track software deployments and usage, maintain license compliance, understand costs & monitor contracts.
Enforces centralized Business Process Management, managed by Line-of-Business (LOB) citizen developers, while keeping stakeholders well informed.
Enables you to analyze, design, and implement flexible and maintainable software architectures.
UFT Developer is a shift-left functional test automation tool that enables easy test creation using the IDE, language, and testing frameworks of choice
UFT One automates functional testing for web, mobile, API, RPA, and enterprise application software, increasing test coverage from the UI to the API.
Unified Communications and VoIP Management is a collection of products that provide assessment, diagnostic and management tools for meeting quality of service objectives for VoIP call quality.
Collects, stores, manages, updates, and shows data on infrastructure configuration
Unstructured Data Analytics OEM SDK – Powered by IDOL
ValueEdge Agile is an Agile planning, DevOps, and value stream management tool that modernizes the way you design, man¬age, and optimize software delivery.
Enable anyone to easily test anything on any platform from anywhere with a one-stop shop for all your functional testing needs.
Our AI-powered value stream management dashboard provides analysis & insight across the entire software delivery lifecycle to show you where to take action.
ValueEdge Quality scales continuous quality with end-to-end visibility, value stream management and quality management to transform software delivery.
Our Strategic Portfolio Management software connects business strategy with agile delivery, providing insights to enable you to prioritize investment in the right initiatives.
Secure sensitive data at scale in analytic platforms and data lakes for faster insights and reduced risk of breach.
Quickly find, protect, and secure your sensitive and high-value data with Voltage Fusion.
Quickly find, protect, and secure your sensitive and high-value data with Voltage Fusion.
Secure your high-value data with our end-to-end data protection techniques to address privacy compliance.
End-to-end, omni-channel payments security and PCI compliance with Voltage encryption and tokenization.
Enabling high-scale, high-performance, and secure data analytics, data science and data sharing.
Streamline the adoption of data-centric security in cloud-based services and on-premises applications.
Achieving email security with an end-to-end email encryption solution without impacting the user experience.
SaaS service for the protection of your most sensitive information and your email transition to Office 365.
Structured data archiving to retire outdated applications and reduce data footprint.
Take advantage of a powerful ZENworks Reporting Server to gain deeper insights into your IT assets.