Average Ratings 0 Ratings
Average Ratings 123 Ratings
Average Ratings 1 Rating
Description
Rapidly create applications without the hassle of overseeing virtual machines or learning unfamiliar tools—simply deploy your app in a cloud-based container. By utilizing Azure Container Instances (ACI), your attention can shift towards the creative aspects of application development instead of the underlying infrastructure management. Experience an unmatched level of simplicity and speed in deploying containers to the cloud, achievable with just one command. ACI allows for the quick provisioning of extra compute resources for high-demand workloads as needed. For instance, with the aid of the Virtual Kubelet, you can seamlessly scale your Azure Kubernetes Service (AKS) cluster to accommodate sudden traffic surges. Enjoy the robust security that virtual machines provide for your containerized applications while maintaining the lightweight efficiency of containers. ACI offers hypervisor-level isolation for each container group, ensuring that each container operates independently without kernel sharing, which enhances security and performance. This innovative approach to application deployment simplifies the process, allowing developers to focus on building exceptional software rather than getting bogged down by infrastructure concerns.
Description
Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location.
Kasm is revolutionizing the way businesses deliver digital workspaces. We use our open-source web native container streaming technology to create a modern devops delivery of Desktop as a Service, application streaming, and browser isolation.
Kasm is more than a service. It is a platform that is highly configurable and has a robust API that can be customized to your needs at any scale. Workspaces can be deployed wherever the work is. It can be deployed on-premise (including Air-Gapped Networks), in the cloud (Public and Private), or in a hybrid.
Description
Ensure your public computers remain operational by utilizing a system that allows for instant resets to a predetermined baseline upon startup or through a hard reset. You can also update this baseline without needing to restart the machine, significantly cutting down on maintenance efforts while safeguarding essential public access computing environments. Formerly known as Drive Vaccine, Reboot Restore Rx Pro is specifically designed to make public PCs resilient against any changes made to their drives, effectively rendering them impervious to damage. This software is ideal for various public access settings, including schools, computer labs, kiosks, hotels, internet cafes, and libraries. Recognizing the challenges associated with maintaining computers in high-traffic public areas where users might be careless, we developed Reboot Restore Rx Pro to be swift, effective, and user-friendly. Regardless of the actions taken by users—be it deleting files, installing unauthorized software, or tampering with system settings—Reboot Restore Rx Pro will seamlessly revert the computer back to its preferred state based on the schedule you establish, offering peace of mind for those managing these devices. With this powerful tool, you can ensure that public computers remain consistently functional and secure, no matter the circumstances.
API Access
Has API
API Access
Has API
API Access
Has API
Integrations
Audacity
Azure Virtual Desktop
Chromium
Docker
FileZilla Pro
Google Authenticator
Maltego
Mozilla Firefox
Oracle Cloud Infrastructure
Postman
Integrations
Audacity
Azure Virtual Desktop
Chromium
Docker
FileZilla Pro
Google Authenticator
Maltego
Mozilla Firefox
Oracle Cloud Infrastructure
Postman
Integrations
Audacity
Azure Virtual Desktop
Chromium
Docker
FileZilla Pro
Google Authenticator
Maltego
Mozilla Firefox
Oracle Cloud Infrastructure
Postman
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$0 Free Community Edition
Free Trial
Free Version
Pricing Details
$39.00/one-time/user
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Microsoft
Founded
1975
Country
United States
Website
azure.microsoft.com/en-us/services/container-instances/
Vendor Details
Company Name
Kasm Technologies
Founded
2017
Country
United States
Website
www.kasmweb.com
Vendor Details
Company Name
Horizon Datasys
Founded
1998
Country
Canada
Website
www.horizondatasys.com
Product Features
Container Management
Access Control
Application Development
Automatic Scaling
Build Automation
Container Health Management
Container Storage
Deployment Automation
File Isolation
Hybrid Deployments
Network Isolation
Orchestration
Shared File Systems
Version Control
Virtualization
Product Features
Application Virtualization
Conflict Prevention
Cross-Platform Support
Dashboard
Debugging
Incident Management
Legacy App Support
Memory Protection
Multiple App Instances
Cloud Workload Protection
Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity
Container Management
Access Control
Application Development
Automatic Scaling
Build Automation
Container Health Management
Container Storage
Deployment Automation
File Isolation
Hybrid Deployments
Network Isolation
Orchestration
Shared File Systems
Version Control
Virtualization
Container Security
Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata
Data Loss Prevention
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Desktop as a Service (DaaS)
Admin Console
Application Management
BYOL Management
Backup & Recovery
Cloud Encryption
Device Management
File Management
GPU Virtualization
Multi-Factor Authentication
Policy Management
Single Sign On
User Provisioning
DevOps
Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports
Digital Workplace
Activity / News Feed
Calendar Management
Chat / Messaging
Content Management
Document Management
Employee Directory
File Sharing
Knowledge Management
Surveys & Feedback
Task Management
Remote Desktop
Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management
Virtual Desktop (VDI)
Desktop-as-a-Service
Load Balancing
Multi-Device Support
Multi-Factor Authentication
Permissions / Access Controls
Self Service Portal
Third Party Integration
Virtualization
Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring
Web Content Filtering
Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting
Product Features
Business Continuity
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Web Access / Restoration
Data Recovery
Web Access / Restoration
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Virtualization
Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring