For the best experience, use Google Chrome or Mozilla Firefox.
The fastest, open, infrastructure-independent, advanced analytics SQL database
Securely access and analyze enterprise (and public) text, audio & video data
An intuitive hunt and investigation solution that decreases security incidents
User and entity behavioral analytics that augments existing security tools and empowers security operations teams to identify and respond to the threats that matter before data is stolen
Autonomous operations through a business lens
Intelligent automation for service desk, configuration, and asset management
SQL analytics solution handling large amounts of data for big data analytics
High-scale protection of sensitive data at rest, in motion, and in use across systems
IDOL connects to more data sources than anyone else.
AI and NLP Based Intelligent Text Analysis in real time
AI and ML Image Classification and Analysis in real time
AI and ML Video Classification and Analysis in real time
AI and ML Audio Classification, Analysis, and Speech to Text
Realtime video, image, and audio data Survailace Analytics
Natural Language Porcessing pinpoints the data you need with simplified AI analytics and analysis
Percise semantic answers to natural language search questions
AI Based Intelligent search engine tools to extract deep insights from all of your data
Communicate and engage customers using AI and ML to deliver a human dialogue chatbot.
OEM SDKs unstructured data analytics to developers, reducing risk, time to market, development costs, and maintenance
File format detection, content decryption, text extraction, subfile processing non-native rendering, and structured export
Optimize the flow of work for continuous quality and delivery
Govern quality with rigorous, auditable software lifecycle processes
Combine extensive technology support with AI-driven continuous functional testing
Enable all aspects of SCCM with enterprise grade scalability, security, and compliance
Deliver high-performing applications with continuous performance engineering
Plan, track, orchestrate, and release complex applications across any environment
Find software security issues early and fix at the speed of DevOps
Automate deployments for continuous delivery with drag-and-drop simplicity
Align corporate investments with business strategy
Access a list of all products in application delivery management
Future-proof core COBOL business applications
Maintain and enhance ACUCOBOL-based applications
Deliver application access—anywhere
Maintain and enhance COBOL systems
Maintain and enhance RM/COBOL applications
Connect COBOL applications to relational database management systems
Derive incremental value with real-time, relational access to COBOL data
Unlock business value with real-time, relational access to ACUCOBOL data
Connect ACUCOBOL applications to relational database management systems
Automatically understand and analyze Micro Focus COBOL applications
Build COBOL applications using Agile and DevOps practices
Deploy COBOL applications across distributed, containerized or cloud platforms
Modernize core business system infrastructure to support future innovation
Manage agile projects using a collaborative, flexible, requirements and delivery platform
Manage requirements with full end-to-end traceability of processes
Automatically understand and analyze IBM mainframe applications
Capture, analyze, and measure the value, cost and risk of application portfolios
Build packages of change artifacts to speed up mainframe application development
Build and manage packages of change artifacts to speed up mainframe application development
Provide multiple change management interfaces to maintain mainframe apps
Build and modernize IBM mainframe COBOL and PL/I applications
Enable faster, efficient parallel development at scale
Fuel mobile apps, cloud initiatives, process automation, and more
Manage mainframe files for fast problem resolution
Easily test mainframe application changes using flexible infrastructure
Compare and manage mainframe data, text, and directory files
Connect Dev and Ops by automating the deployment pipeline and reduce feedback time
Centralize planning and control for the entire software release lifecycle
Orchestrate and integrate processes for faster software development and delivery
Detect changes, synchronizes multiple environments, and restores failed systems
Execute IBM mainframe COBOL and PL/I workload on Windows, Linux and the Cloud
Execute modernized IBM mainframe workloads under Microsoft .NET and Azure
Modernize IBM, HP, and Unix application access across desktop and mobile devices
Web-enable IBM and VT application desktop access, Java free
Modernize Unisys mainframe application desktop access
Modernize IBM, HP, and Unix application desktop access
Automate IBM, HP, and Unix application desktop access
Gain access to everything required to successfully integrate the mainframe in your RPA projects
Create new applications and workflows with Web services and APIs for IBM, HP, and UNIX applications
Fuel analytics platforms and BI applications with Unisys MCP DMSII data in real time
Centralize host access management with identity-powered access control and data security
Modernize file transfer with security, encryption and automation, within and across the firewall
Learn how Advanced Authentication Connector for z/OS is a multi-factor authentication for all your IBM z/OS end points
Measure and manage terminal-based software deployment and usage
Centralize host access management with identity-powered access control and data security
Develop and deploy applications with a comprehensive suite of CORBA products
Build distributed applications at enterprise scale
Develop, deploy, and support CORBA 2.6 compliant middleware in C++ or Java
Connect applications on diverse operating environments
Email, IM, chat-based teamwork, anti-virus, anti-spam, disaster recovery, and more
Provides secure file access and sharing from any device
Provides secure email, calendaring, and task management for today's mobile world
Backup and disaster recovery solution that ensures critical email is always available
Seven essential tools to build IT infrastructures, including secure file sharing
Provides secure team collaboration with document management and workflow features
Protect your network and messaging system from malware, viruses, and harmful content
Provides single sign-on for enterprises and federation for cloud applications
Protect your sensitive information more securely with multi-factor authentication
File Reporter and Storage Manager solution suite bundle
File Reporter for OES examines OES network file systems and delivers intelligent file insights so you can make the most intelligent business decisions.
Provides secure file access and sharing from any device
Protects your key business systems against downtime and disaster
Simplifies resource management on a Storage Area Network and increases availability
File, print, and storage services perfect for mixed IT environments
Policy-based backup and ransomware protection for your endpoint devices
Application containerization & application streaming improves organizational remote work & remote learning
Track software deployments and usage, maintain license compliance, understand costs & monitor contracts.
Manage your mobile and traditional endpoint devices anywhere, with Unified Endpoint Management
Secure your Windows devices with policy-based device controls.
Protect data on your Windows desktops and laptops by encrypting fixed disks.
Identify missing software patches and applicable CVEs, automate patch delivery with policies.
Fast and easy ITIL-based service desk solution, integrated with Unified Endpoint Management.
ZENworks Suite helps you easily track, manage, and protect your endpoint devices.
Reduce false positives, ensure audit controls, achieve regulatory compliance and save review time.
Streamline compliance with Digital Safe multichannel archiving and supervision
Monitor the breadth of business communications for ediscovery, data governance and regulatory compliance.
Cloud-native, social collaboration-optimized reporting and interactive visual dashboards.
End-users can simply access, search, review and print or download any of their own archived materials.
Manage electronic discovery from ingestion through review – one tool – one technology.
Simplify and optimize compliance through expert-led Managed Cloud Services and Archiving Consulting Services.
Reduce false positives, ensure audit controls, achieve regulatory compliance and save review time.
Streamline compliance with Digital Safe multichannel archiving and supervision
Monitor the breadth of business communications for ediscovery, data governance and regulatory compliance.
Cloud-native, social collaboration-optimized reporting and interactive visual dashboards.
End-users can simply access, search, review and print or download any of their own archived materials.
Manage electronic discovery from ingestion through review – one tool – one technology.
Simplify and optimize compliance through expert-led Managed Cloud Services and Archiving Consulting Services.
Archive email to stay compliant and in control with a central data archive.
Stay compliant with text message archiving of iOS, Android, and BlackBerry devices for your organization.
AI Unstructured data analytics for text, audio, video and image data
Helping organizations meet data privacy regulatory guidelines through the management & disposition of data.
Address the ever-changing needs of network data management
File analysis to discover, classify and automate policy on unstructured data
Discover what is being stored and who has access
Structured data archiving to retire outdated applications and reduce data footprint
Identity-driven governance of data & access
SaaS-based file analysis on all of your unstructured data
Respond to litigation and investigations quickly, accurately, & cost-effectively
Securely access and analyze enterprise (and public) text, audio & video data
Backup and disaster recovery for diverse, dynamic, and distributed enterprise
IDOL connects to more data sources than anyone else.
AI and NLP Based Intelligent Text Analysis in real time
AI and ML Image Classification and Analysis in real time
AI and ML Video Classification and Analysis in real time
AI and ML Audio Classification, Analysis, and Speech to Text
Realtime video, image, and audio data Survailace Analytics
Natural Language Porcessing pinpoints the data you need with simplified AI analytics and analysis
Percise semantic answers to natural language search questions
AI Based Intelligent search engine tools to extract deep insights from all of your data
Communicate and engage customers using AI and ML to deliver a human dialogue chatbot.
File format detection, content decryption, text extraction, subfile processing non-native rendering, and structured export
Close city transportation security gaps to mitigate risk using AI and Machine Learning.
Identify global trends, sentiment, key word mentions, and run AI-powered open source intelligence (OSINT) analysis.
Digital forensics for organizations processing video and image evidence who need to identify, extract facts during an investigation
Automated human-like digital assistant which can engage in natural language dialogues.
AI-powered Brand reputation monitoring and Protection
OEM SDKs unstructured data analytics to developers, reducing risk, time to market, development costs, and maintenance
Engaging end-user experience and efficient service desk based on machine learning
AIOps for Cloud Monitoring - Automated event and performance monitoring for multi-cloud and on-premises environments
Automate and manage traditional, virtual, and software-defined networks
Discover and manage configuration items (CIs) in Hybrid IT environments
Simplify fulfillment automation and enforce governance
Automate and orchestrate end-to-end processes with refreshing ease and superior control
Manage IT assets for improved costs
Automate provisioning, patching, and compliance across the data center
Build, secure, and scale automated business processes across the enterprise
Access a list of all products in IT Operations Management
A comprehensive threat detection, analysis, and compliance management SIEM solution
An intelligent log management solution that eases compliance burdens and accelerates forensic investigation for security professionals
A comprehensive log management solution for easier compliance, efficient log search, and secure cost-effective storage.
Download and deploy pre-packaged content to dramatically save time and management
A future-ready data platform that transforms data chaos into security insight.
User and entity behavioral analytics that augments existing security tools and empowers security operations teams to identify and respond to the threats that matter before data is stolen
A fully-featured, adaptable solution that simplifies the day-to-day use of SIEM
A comprehensive Security Orchestration Automation Response platform with cognitive automation, investigation service desk, process orchestration and SOC analytics.
SaaS-based file analysis on all of your unstructured data
Identify, analyze, and manage your data; then establish policies to protect your data properly and efficiently, in use and throughout its lifecycle, and ensure data preservation.
Persistent file encryption, complete control, and visibility to simplify unstructured data security
Format-preserving encryption, tokenization, data masking, and key management
Omni-channel PCI compliance and data protection for end-to-end payments security
Email, file, and Office 365 protection for PII, PHI, and Intellectual Property
Saas cloud email encryption to protect information on Office 365
Identifies security vulnerabilities in source code early in software development
Provides comprehensive dynamic analysis of complex web applications and services
Gain valuable insight with a centralized management repository for scan results
Manage your entire application security program from one interface
Provisions and governs access to unstructured data
Provides an LDAP directory with incredible scalability and an agile platform
Provides automated user access review and recertification to remain compliant
Delivers an intelligent identity management framework to service your enterprise
Provides single sign-on for enterprises and federation for cloud applications
Move beyond username and passwords and securely protect data and applications
Multi-factor Authentication for all your IBM z/OS end points
Integrate the host with your modern security framework
Adapt the authentication and access experience to the risk at hand.
Enables users to reset their passwords without the help of IT
Streamlines authentication for enterprise apps with a single login experience
Protect and manage access to your APIs.
Enables IT administrators to work on systems without exposing credentials
Limits administrative privileges and restricts directory views to specific users
Edit, test and review Group Policy Object changes before implementation
Protect critical data, reduce risk and manage change with Change Guardian
Extend the power of Active Directory to Linux resources
Unify and centrally manage policies across multiple platforms.
Protect critical data, reduce risk and manage change with Change Guardian
Finds and repairs configuration errors that lead to security breaches or downtime
Provides easy compliance auditing and real-time protection for IBM iSeries systems
Help you embed security throughout the IT value chain and drive collaboration between IT operations, applications, and security teams.
Help you to react faster and gain a competitive advantage with enterprise agility.
Accelerate your hybrid cloud outcomes with advisory, transformation and implementation services.
Application management services that let you out-task solution management to experts who understand your environment.
Strategic consulting services to guide your digital transformation agenda.
Fully functional use-case modeling, with pre-built integrations across the Micro Focus Software portfolio, showcasing real-life use-case
Expert security intelligence services to help you quickly architect, deploy, and validate your Micro Focus security technology implementation.
A service integration and management service that optimizes delivery, assurance, and governance in multi-supplier settings.
Get insights from big data with real-time analytics, and search unstructured data.
Get insights from big data with real-time analytics, and search unstructured data.
Get insights from big data with real-time analytics, and search unstructured data.
Mobile services that ensure performance and expedite time-to-market without compromising quality.
Get insights from big data with real-time analytics, and search unstructured data.
Comprehensive Big Data services to propel your enterprise forward.
All Micro Focus learning in one place
Find products and support info below.
In 2001, Charles Taite and Marc St-Arnaud established Beginfinite Inc. to ensure the security and stability of government, education, healthcare, and financial institutions running Micro Focus GroupWise. The company’s flagship product, GWAVA, an acronym for GroupWise Anti Virus Agent, quickly eclipsed the company name, and in 2004 Beginfinite became GWAVA, Inc. Josh Gibbs and Michael Bell, creators of the GWAVA product, joined the company in 2004.
GWAVA grew to offer leading multi-platform messaging security and unified archiving solutions for Microsoft Exchange, Office 365, Gmail, GroupWise, and more. GWAVA products have been trusted and implemented in thousands of government, education, healthcare, and financial institutions in 60 countries.
The Retain Unified Archiving solution by GWAVA enables organizations to seamlessly archive all electronic business communication data, including archiving email, archiving social media and instant messaging, and archiving mobile communication in one central location.
GWAVA was acquired by Micro Focus International in 2016.