List of Meridian Global LMS Integrations

This is a list of platforms and tools that integrate with Meridian Global LMS. This list is updated as of April 2025.

  • 1
    VIPRE Security Awareness Reviews & Ratings

    VIPRE Security Awareness

    Inspired eLearning powered by VIPRE

    Empower your team with expert training for cybersecurity resilience.
    Inspired eLearning, in collaboration with VIPRE, offers advanced security awareness training aimed at reducing security risks that stem from human error within organizations. By merging top-tier cybersecurity software with accessible, targeted solutions, Inspired eLearning ensures that employees are well-equipped to recognize and address contemporary cyber threats effectively. With a wealth of knowledge accumulated over 15 years in enterprise cybersecurity, the company has developed three detailed, ready-to-use training packages that cater to diverse business needs and experience levels: Security First: Select, Security First: Preferred, and Security First: Elite. Each package features a variety of resources, including comprehensive training courses, engaging micro-learning experiences, skills evaluations, and phishing simulations backed by PhishProof, a method recognized for boosting employee awareness and preparedness. These offerings are constructed on a foundation of automation, empowering organizations to track their progress, adopt best practices, and cultivate a strong security-oriented culture among their teams. By emphasizing education and a proactive approach to defense, Inspired eLearning not only prepares organizations to tackle existing threats but also equips them to adapt to future challenges in the cyber landscape. This commitment to ongoing learning and adaptation is essential for maintaining a resilient security posture in an ever-changing digital world.
  • 2
    Inspired eLearning HR & Compliance Reviews & Ratings

    Inspired eLearning HR & Compliance

    Inspired eLearning powered by VIPRE

    Empower your workplace culture with effective compliance solutions.
    A single incident of harassment or a breach of compliance can result in significant expenses, impacting not only financial resources but also leading to decreased productivity, diminished morale, and harm to the company's reputation. Inspired eLearning offers online HR and Compliance solutions that mitigate these hazards effectively. Our programs are supported by the esteemed employment law firm Fisher Phillips, ensuring proven accountability while educating businesses on crucial governmental and industry standards. Workplace harassment can trigger expensive legal battles, erode morale, damage reputations, and ultimately reduce profits. The harassment training program provided by Inspired eLearning not only safeguards your organization from legal repercussions but also fosters a nurturing workplace where every employee feels safe and valued. The ethical framework of an organization forms the bedrock of its culture, and Inspired eLearning is dedicated to cultivating an environment where employees make choices that align with the company’s core values while adhering to industry regulations. Through our comprehensive training, businesses can not only comply with legal requirements but also strengthen their internal culture, leading to long-term success.
  • 3
    Watershed Reviews & Ratings

    Watershed

    Watershed

    Streamline educational data, enhance reporting, and unify insights.
    Watershed serves as a tool to standardize and gather information from your educational environment, facilitating automated reporting, minimizing waste, and establishing a unified source of truth. By utilizing Watershed's Learning Record Store (LRS), which gathers data through xAPI and unique connectors alongside a data conversion engine, users can avoid the difficulties associated with accessing fragmented data from various systems. Additionally, the platform offers powerful learning analytics that ensure comprehensive reporting capabilities, including enterprise-level integration, data protection, and the ability to scale as needed. This integration not only streamlines data collection but also enhances the overall efficiency of learning management processes.
  • 4
    OpenSesame Reviews & Ratings

    OpenSesame

    OpenSesame

    Unmatched eLearning courses tailored for impactful skill development.
    Our extensive assortment of eLearning courses is unmatched, featuring offerings from premier publishers globally. We assist you in identifying the most suitable courses, aligning them with your essential skills, integrating them into your Learning Management System, and enhancing both usage rates and the effectiveness of your learning and development initiatives. Our meticulously selected catalog boasts thousands of courses that encompass areas such as business acumen, safety protocols, technological advancements, professional certifications, and various specialized industry subjects, ensuring a comprehensive learning experience for all. Additionally, our team is dedicated to providing ongoing support to maximize the impact of your training programs.
  • 5
    iSecurity Audit Reviews & Ratings

    iSecurity Audit

    Raz-Lee Security

    Empower your IBM i security with real-time auditing solutions.
    iSecurity Audit enhances the inherent auditing features of IBM i by offering continuous surveillance and detailed reporting on all activities occurring within the IBM i ecosystem. Through its capability for real-time detection, it swiftly identifies security incidents and meticulously logs pertinent information for subsequent review. The audit logs can be visually represented in intuitive graphical formats, accompanied by straightforward explanations for each log entry, which aids in the rapid assessment of statistical information. One of the standout attributes of this system is its functionality to trigger alerts or implement immediate corrective actions in response to identified security threats. Specifically tailored for non-technical users, including external auditors and managerial staff, iSecurity Audit is recognized as the only security auditing solution for IBM i designed with accessibility at the forefront. Moreover, this sophisticated auditing tool not only ensures the monitoring of real-time activities but also activates alerts and responses to potential security weaknesses, establishing itself as a vital asset. Additionally, it features an extensive report generation system that includes over one hundred customizable, pre-configured reports, guaranteeing that all aspects of security auditing requirements are thoroughly addressed. This comprehensive approach not only enhances security management but also empowers users to stay informed about the overall health of their IBM i environment.
  • 6
    iSecurity AP-Journal Reviews & Ratings

    iSecurity AP-Journal

    Raz-Lee Security

    Protect your data with unparalleled monitoring and compliance.
    iSecurity AP-Journal is designed to protect crucial business information from both internal and external threats while keeping managers updated on any changes to information assets, which streamlines the IBM i journaling process. It carefully logs all activities, detailing who performed what actions, when they occurred, and which specific steps were taken. In contrast to standard IBM i journaling, this solution captures READ operations directly into journal receivers, making it essential for compliance adherence. It continuously monitors changes to objects, application files, and their members while also accommodating periodic structural modifications in application files. This tool allows for the tracking of application files during such updates and offers customizable routines tailored to specific field exits. Additionally, it provides instant notifications for alterations in critical business data, with alerts activated by user-defined thresholds. It also produces comprehensive reports that display all application changes on a singular timeline and in various formats, ensuring thorough monitoring of data integrity. This extensive reporting not only boosts transparency but also plays a crucial role in sustaining strong security measures across the organization. Ultimately, the robust capabilities of iSecurity AP-Journal contribute significantly to enhancing the overall security framework of the business.
  • Previous
  • You're on page 1
  • Next