Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Our innovative virtual networking strategy utilizes a range of software elements designed to channel, route, and accelerate application data, thereby greatly improving network security, reliability, and efficiency across various devices such as laptops, tablets, smartphones, and Internet of Things (IoT) gadgets. The Dispersive™ Virtual Networks represent a patented, military-grade overlay solution based on multi-path software-defined networking. This approach involves software components that work in unison to manage traffic, effectively boosting security, dependability, and performance for all connected devices, including laptops, tablets, mobile phones, and IoT devices. At the authenticated source, data streams are divided and reassigned with a Dispersive™ Virtual Network (DVN) header, which directs traffic along multiple network paths according to the directives from the Dispersive™ Virtual Network (DVN) Controller, which may operate across one or several physical circuits. By utilizing this architecture, the Dispersive™ Virtual Network (DVN) guarantees reliable packet delivery and significantly enhances the quality of service experienced by users. In doing so, it ensures a seamless and secure networking experience that adapts to the diverse needs of modern digital environments.
Description
On-demand creation and management of virtual networks allows you to tailor your setup to your needs. You can swiftly and effortlessly install virtual network client software on new devices without needing to visit each location. Hamachi operates in the background on connected systems, ensuring you maintain access even when those machines are not actively monitored. Subscriptions are available in Standard, Premium, and Multi-network options. This service enables remote users to securely connect to designated computers within your network from virtually anywhere, eliminating the need for changes to firewalls or network routers. Additionally, a straightforward virtual mesh network can be established, allowing remote devices to connect directly, which provides users with essential access to all necessary network resources. You have the capability to manage network access effectively, overseeing aspects such as password management, authentication protocols, network locking, and continuous membership oversight. Furthermore, this comprehensive approach enhances security and efficiency within your virtual networking environment.
API Access
Has API
API Access
Has API
Integrations
Amazon Web Services (AWS)
Google Cloud Platform
Lift AI
Truto
Integrations
Amazon Web Services (AWS)
Google Cloud Platform
Lift AI
Truto
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$49 per year
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Dispersive Networks
Founded
2010
Country
United States
Website
dispersive.io/technology/
Vendor Details
Company Name
LogMeIn
Country
United States
Website
www.vpn.net
Product Features
Virtualization
Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring
VPN
Anonymous Browsing
DNS Leak Protection
For Digital Security
For Financial Security
For Gaming
For Streaming
Kill Switch
Multi-Language
Multi-Protocol
Peer-to-Peer
Policy Management
Remote Access
Web Inspection
White Label
Product Features
VPN
Anonymous Browsing
DNS Leak Protection
For Digital Security
For Financial Security
For Gaming
For Streaming
Kill Switch
Multi-Language
Multi-Protocol
Peer-to-Peer
Policy Management
Remote Access
Web Inspection
White Label