Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Nfusion offers a virtual desktop setup designed to help you oversee your attribution effectively, enabling you to have thorough control over the technical and behavioral aspects of your online identity. Our solution merges digital fingerprint obfuscation with built-in data collection tools and compatibility with various third-party applications. By utilizing Nfusion, you can operate within a remote, secure virtual desktop infrastructure (VDI) that you connect to via a VPN, giving you the ability to navigate the web from one of our exclusive points of presence, which allows you to choose your perceived location. After each session concludes, your virtual machine is reset, eliminating any potential malware or tracking elements. Additionally, you have the flexibility to customize your workspace with a range of third-party applications, such as Maltego, i2 Analyst Notebook, Wickr, Telegram, and other messaging services, enhancing your investigative capabilities while ensuring privacy and security. Overall, Nfusion streamlines your online operations while safeguarding your digital footprint.

Description

Red Hat® Virtualization serves as an enterprise-grade platform for virtualization, adept at handling high-demand workloads and essential applications, leveraging the robust foundation of Red Hat Enterprise Linux® and KVM, with complete support from Red Hat. This solution enables the virtualization of resources, processes, and applications, establishing a reliable base for a future that embraces cloud-native and containerized technologies. It allows for the automation, management, and modernization of virtualization workloads seamlessly. Whether it's streamlining daily tasks or overseeing virtual machines within Red Hat OpenShift, Red Hat Virtualization leverages the existing Linux® expertise of your team and enhances it for upcoming business requirements. Additionally, it is built on a comprehensive ecosystem of platforms and partner solutions, integrating with Red Hat Enterprise Linux, Red Hat Ansible Automation Platform, Red Hat OpenStack® Platform, and Red Hat OpenShift, which collectively enhance IT productivity and maximize return on investment while positioning your organization for future growth and innovation.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Bacula Enterprise
KeepItSafe
Maxta
Red Hat CloudForms
Red Hat OpenShift
Storware
TrilioVault

Integrations

Bacula Enterprise
KeepItSafe
Maxta
Red Hat CloudForms
Red Hat OpenShift
Storware
TrilioVault

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Ntrepid

Founded

2010

Country

United States

Website

www.ntrepidcorp.com

Vendor Details

Company Name

Red Hat

Founded

1993

Country

United States

Website

www.redhat.com

Product Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Product Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Server Virtualization

Audit Management
Health Monitoring
Live Machine Migration
Multi-OS Virtual Machines
Patching / Backup
Performance Log
Performance Optimization
Rapid Provisioning
Security Management
Type 1 / Type 2 Hypervisor

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Alternatives

Alternatives

oVirt Reviews

oVirt

oVirt
Authentic8 Silo Reviews

Authentic8 Silo

Authentic8
KVM Reviews

KVM

Red Hat
Dhound Reviews

Dhound

IDS Global