Learn More

Average Ratings 127 Ratings

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm is revolutionizing the way businesses deliver digital workspaces. We use our open-source web native container streaming technology to create a modern devops delivery of Desktop as a Service, application streaming, and browser isolation. Kasm is more than a service. It is a platform that is highly configurable and has a robust API that can be customized to your needs at any scale. Workspaces can be deployed wherever the work is. It can be deployed on-premise (including Air-Gapped Networks), in the cloud (Public and Private), or in a hybrid.

Description

A significant digital transformation has reshaped our work landscape irrevocably. The integration of mobile technology and cloud services has established a new norm of accessing information and tools from virtually anywhere at any time. This newfound availability and flexibility have blurred the lines defining traditional workplace environments. With the removal of these boundaries, the ongoing tension between connectivity and security has intensified, highlighting the challenges faced by modern enterprises. Organizations are now tasked with navigating the complexities of safeguarding both virtual and physical realms, often leaving them vulnerable to potential threats and mismanagement. In this evolving landscape, it is crucial for individuals to have seamless access to the data and resources needed to perform their roles effectively and efficiently, irrespective of their location, all while maintaining the integrity of their mission or project. Replica addresses these challenges by creating secure virtual environments that prioritize the protection of identities and assets, regardless of the nature of the work being undertaken. By simplifying digital privacy and implementing genuine zero-trust protection, Replica empowers every user while significantly mitigating associated risks, making it an essential tool in today’s workplace. This innovative approach ensures that organizations can thrive in an increasingly digital world without sacrificing security or efficiency.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Chromium
FileZilla Pro
GIMP
Google Chrome
Inkscape
Insomnia
Microsoft Azure
Microsoft Edge
Okta
OneLogin
Postman
Skycloak
Sublime Text
Tailscale
Thunderbird
Tor Browser
Ubuntu
VLC Media Player
Windows 365
openSUSE Leap

Integrations

Chromium
FileZilla Pro
GIMP
Google Chrome
Inkscape
Insomnia
Microsoft Azure
Microsoft Edge
Okta
OneLogin
Postman
Skycloak
Sublime Text
Tailscale
Thunderbird
Tor Browser
Ubuntu
VLC Media Player
Windows 365
openSUSE Leap

Pricing Details

$0 Free Community Edition
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Kasm Technologies

Founded

2017

Country

United States

Website

kasm.com

Vendor Details

Company Name

Replica

Country

United States

Website

replicacyber.com

Product Features

Application Virtualization

Conflict Prevention
Cross-Platform Support
Dashboard
Debugging
Incident Management
Legacy App Support
Memory Protection
Multiple App Instances

Cloud Workload Protection

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity

Container Management

Access Control
Application Development
Automatic Scaling
Build Automation
Container Health Management
Container Storage
Deployment Automation
File Isolation
Hybrid Deployments
Network Isolation
Orchestration
Shared File Systems
Version Control
Virtualization

Container Security

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Desktop as a Service (DaaS)

Admin Console
Application Management
BYOL Management
Backup & Recovery
Cloud Encryption
Device Management
File Management
GPU Virtualization
Multi-Factor Authentication
Policy Management
Single Sign On
User Provisioning

DevOps

Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports

Digital Workplace

Activity / News Feed
Calendar Management
Chat / Messaging
Content Management
Document Management
Employee Directory
File Sharing
Knowledge Management
Surveys & Feedback
Task Management

Remote Desktop

Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management

Virtual Desktop (VDI)

Desktop-as-a-Service
Load Balancing
Multi-Device Support
Multi-Factor Authentication
Permissions / Access Controls
Self Service Portal
Third Party Integration

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Web Content Filtering

Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting

Product Features

Desktop as a Service (DaaS)

Admin Console
Application Management
BYOL Management
Backup & Recovery
Cloud Encryption
Device Management
File Management
GPU Virtualization
Multi-Factor Authentication
Policy Management
Single Sign On
User Provisioning

Alternatives

Alternatives

Citrix Workspace Reviews

Citrix Workspace

Cloud Software Group
Soliton Reviews

Soliton

Soliton Systems