Business Software for Microsoft Hyper-V

Top Software that integrates with Microsoft Hyper-V

  • 1
    MaxPatrol Reviews

    MaxPatrol

    Positive Technologies

    MaxPatrol is designed to oversee vulnerabilities and ensure compliance within corporate information systems. Central to its functionality are penetration testing, system evaluations, and compliance oversight. These components provide a comprehensive view of security across the entire IT infrastructure while also offering detailed insights at the departmental, host, and application levels, delivering essential information that facilitates the swift identification of vulnerabilities and the prevention of potential attacks. Additionally, MaxPatrol streamlines the process of maintaining an updated inventory of IT assets. It allows users to access details regarding network resources—including network addresses, operating systems, and available applications and services—while also identifying the hardware and software in operation and tracking the status of updates. Remarkably, it monitors changes within the IT infrastructure without missing a beat, detecting new accounts and hosts as they emerge and adapting to updates in hardware and software. Data regarding the security status of the infrastructure is continuously gathered and analyzed, ensuring that organizations have the insights necessary to maintain robust security protocols. This proactive approach not only enhances security awareness but also empowers teams to respond effectively to emerging threats.
  • 2
    Airlock Reviews
    The Secure Access Hub by Airlock safeguards applications, APIs, and data from identity theft and prevalent web application threats. Blending security with user-friendliness, Airlock ensures a seamless customer experience through features like single sign-on, social registration, extensive user self-service options, and effective consent management. In a market that demands agility, the Airlock Secure Access Hub is designed to deliver crucial security functions, including registration, authentication, and user self-services, allowing businesses to focus their IT resources on core operations. Furthermore, this hub assists in adhering to various international compliance standards, encompassing GDPR, PSD2, PCI-DSS, OWASP, and MAS. By serving as a centralized enforcement point for access policies related to applications and services, it enables compliance with regulations while minimizing the need for modifications in each application. This innovative solution not only enhances security but also streamlines operational efficiency for businesses.
  • 3
    StarWind Virtual SAN (VSAN) Reviews
    StarWind VSAN specifically caters to the requirements of small businesses with limited IT budgets. It efficiently utilizes nearly all of the IOPS from your current raw storage, eliminating the need for costly hardware. The licensing model is transparent and adaptable, free from hidden fees or restricted features. With StarWind's Virtual SAN, you can achieve impressive uptime and fault tolerance using just a pair of nodes, and opting for a witness is entirely optional. Your IT setup remains robust even in the event of losing a complete node along with a separate storage device, whether it's an HDD or SSD. You have the flexibility to scale your system as needed, whether that means expanding, contracting, or extending. Management of your hyper-converged infrastructure clusters is made simple through an integrated StarWind web interface. Additionally, our team will help transition your existing workloads to StarWind at no additional charge! Our offering is uniquely crafted to provide enterprise-level capabilities to small and medium-sized businesses that cannot afford large corporate budgets. Notably, StarWind VSAN operates effectively in a two-node configuration without necessitating witnesses, delivering all the expected advantages right from the start. This solution empowers small businesses to leverage advanced technology without the financial burden typically associated with enterprise systems.
  • 4
    Diladele Web Filter Reviews
    When a user attempts to visit a website on the Internet, their browser initiates a connection to that site directly or through specified proxy settings. This interaction is processed by Squid, which authenticates the requests and forwards them to a Web Safety ICAP filter, either locally or remotely hosted. Both the requests and responses are scrutinized to determine access based on established policy rules, while relevant information is logged in a database. Web Safety serves as an ICAP web filter that seamlessly integrates with the Squid proxy, enabling it to conduct URL filtering and in-depth content analysis of encrypted HTTPS traffic. This capability allows for effective blocking of explicit encrypted content, as the system performs thorough inspections of web pages, preventing access to any material that contains adult language or leads to dubious sites. Additionally, popular general-purpose websites such as Google Search, Google Images, Bing, and YouTube are also monitored, ensuring that any inappropriate content is filtered out. By implementing these measures, the system enhances online safety for users across the board.
  • 5
    Unitrends Security Manager Reviews
    More than 70% of cyber security breaches originate from internal threats, such as misconfigurations, unauthorized access, and inadequate backups, which traditional firewalls and antivirus solutions fail to mitigate. These vulnerabilities enable attackers to exploit weaknesses and compromise systems without being detected. To thwart potential intruders, consider using Unitrends Security Manager, which proactively warns you of threats before they can escalate. This innovative tool performs comprehensive scans of your servers, data, and network every 24 hours, providing timely alerts about internal vulnerabilities. The alerts are compiled into a user-friendly report that can be organized by severity or type of problem, making it easier to prioritize responses. You can also configure these alert reports to be sent directly to specified emails, including your ticketing system, ensuring that relevant parties are promptly informed. Additionally, Unitrends Security Manager features "smart tags," enabling it to tailor its detection capabilities to each specific client by incorporating detailed information about users, assets, and configurations. This level of customization enhances the system's efficacy, allowing for a more robust defense against internal threats.
  • 6
    UnixWare Reviews
    Xinuos has recently launched UnixWare® 7.1.4, the most up-to-date version of its acclaimed UNIX® operating system. This robust and reliable system is designed to cater to your essential business applications while remaining cost-effective for all computing requirements. It is compatible with the latest industry-standard hardware and peripherals, incorporating enhanced performance, scalability, and reliability—hallmarks of the UnixWare brand. Additionally, the default configurations of the most sought-after editions have been optimized to enhance their value proposition. Both new installations and upgrades to UnixWare 7.1.4 will instantly reap the benefits of these improvements. A new, budget-friendly edition has also been introduced, specifically tailored for low-cost pilot projects, edge computing services, and business applications for smaller enterprises. This ensures that even small companies can access cutting-edge technology without breaking the bank.
  • 7
    Palo Alto Networks Panorama Reviews
    Panorama™ provides a user-friendly platform for centralized management, allowing for quick implementation of features that enhance visibility into network traffic and streamline configurations. Users can easily create and modify security rules that align with their organization's security policies, all from a single, centralized interface that oversees their entire firewall deployment. By utilizing the Application Command Center (ACC), administrators can gain valuable insights and visibility into network threats and traffic, which is essential for effective security management. The automated correlation engine helps to minimize data overload, enabling quicker identification of compromised systems and detection of malicious activities. With the capability to manage up to 5,000 Next-Generation Firewalls, or by utilizing the Panorama Interconnect plugin, organizations can centralize configuration management for potentially tens of thousands of devices. The intuitive user interface of Panorama not only simplifies the security management process but also provides tools for monitoring, configuring, and automating various security tasks, making it an essential solution for modern network security challenges. This comprehensive approach ensures that organizations can maintain robust security while effectively managing their network infrastructure.
  • 8
    Diamond IP Reviews
    Streamline essential DDI operations to enhance agile IT service delivery. Our IP address management (IPAM) solutions are designed to be flexible, scalable, and extensible. Diamond IP offers a comprehensive IPAM system that simplifies the management of both IPv4 and IPv6 address lifecycles across various environments, including on-premises, remote branches, and both private and public cloud domains. We provide a range of offerings, including software, hardware, and virtual appliances for both private and public cloud use, along with managed IPAM services. Our solutions support multi-cloud IPAM through virtual appliances compatible with platforms like AWS, Azure, Oracle VM, VMware, and Hyper-V. Furthermore, our cloud automation appliance plays a crucial role in automating the assignment and monitoring of IP addresses and DNS names for both private and public cloud instances. To bolster your security strategy, our DNS security products add an extra layer of protection at the DNS level. We are committed to serving multinational organizations globally with our extensive range of security, cloud, and networking services, ensuring they have the necessary tools to thrive in a complex digital landscape.
  • 9
    BlueCat Gateway Reviews
    BlueCat Gateway provides a flexible automation layer that unifies DNS operations and integrates seamlessly with the broader Integrity platform. Its Python-based framework gives NetOps, CloudOps, and DevOps teams the freedom to automate everything from routine provisioning to highly complex workflows. Gateway connects easily to platforms like ServiceNow, enabling compliant self-service IP provisioning based on predefined logic and organizational policies. Through Terraform integration and a broad catalog of applications, teams can deeply customize their environments without being locked into proprietary tools. The platform’s intuitive UI allows authorized users to build, edit, and reuse automation workflows quickly, accelerating iteration while reducing operational overhead. Gateway enhances visibility by synchronizing cloud-based resources and providing detailed logs, reports, and health metrics. Its adaptive ecosystem—including open-source scripts from the BlueCat Labs GitHub—gives organizations endless customization potential. Altogether, Gateway empowers IT teams to automate faster, operate more efficiently, and deliver consistent network services across distributed environments.
  • 10
    Useit Fax Server Reviews
    Useit Fax Server v9 is an advanced .NET-based fax server that offers seamless fax and mail integration for platforms such as Office 365, Gmail, and Microsoft Exchange, along with MFP fax integration and a web-based administration interface, all supported by exceptional customer service. This solution allows businesses to minimize initial expenses while providing the flexibility to expand the fax server as their operations grow, making the process of adding lines and DIDs both efficient and straightforward. Connect with a solutions expert today to tailor a fax server that meets your specific requirements while remaining budget-friendly. Additionally, it features comprehensive web-based reporting tools for tracking fax metrics, the ability to customize email templates, and the option to incorporate your logo for a more personalized branding experience. Such features ensure that your business can maintain a professional image while effectively managing communications.
  • 11
    OpenText Migrate Reviews
    OpenText Migrate provides a streamlined and secure way to move physical, virtual, and cloud workloads to or from any environment with near-zero downtime. Leveraging real-time, byte-level replication, the platform continuously duplicates source data efficiently, minimizing bandwidth use and maintaining user productivity during migration. It supports a wide variety of operating systems and cloud platforms such as AWS, Azure, and Google Cloud, offering complete flexibility. Automated configuration and management simplify complex migration steps and help avoid errors. OpenText Migrate ensures strong security with AES 256-bit encryption protecting data in transit. The solution’s cutover process is fast, repeatable, and easily reversible if needed. Users can also conduct unlimited non-disruptive test migrations to validate the new environment without affecting ongoing operations. This comprehensive approach helps organizations reduce costs, avoid vendor lock-in, and minimize migration risks.
  • 12
    Bosch Video Management System Reviews
    The Bosch Video Management System stands out as an innovative enterprise-level IP video security solution, enabling effortless oversight of digital video, audio, and data over any IP network. It is optimally designed to complement Bosch CCTV equipment, enhancing the performance of Bosch cameras and recording technology. Additionally, it features interfaces and standards that facilitate the integration of systems from other manufacturers. The system is notable for its embedded resilience, ensuring continuity of operations even in the event of failures in both Management and Recording Servers. With intelligent Video Analyses conducted at the edge and its exceptional recording capabilities, the system can manage up to 2000 cameras, including 500 ONVIF cameras, with a single server, thus significantly lowering the overall cost of ownership. This single Management Server System is capable of handling 1 to 2000 cameras right out of the box, making it an attractive choice for a variety of applications. Furthermore, it is the only solution that offers connectivity with Bosch VMS-BIS, and it supports multiple Management Server configurations, catering to the needs of large-scale environments like airports and metropolitan areas.
  • 13
    Hosting Controller Reviews
    Every organization, whether in the public or private sector, must implement a 'control panel' for their software applications to effectively manage their digital transformation journey. This solution offers comprehensive lifecycle support that aids businesses in automating various operations such as service provisioning, billing, customer management, and onboarding of new services. It provides a distinctive combination of on-premises and cloud solutions accessible through a unified interface. As a Microsoft CSP™, it allows the sale of individual billable service bundles efficiently. Our 'private cloud control panel' positions the cloud in proximity to your data, whether it resides on-site or in your dedicated data center. Envision it as your personal Office 365™ for managing Microsoft applications, or as a versatile Azure™ or AWS™ platform for your virtual machines, along with a centralized control panel for numerous other applications. The solution also features a single programmable access channel through an extensive REST API, ensuring a streamlined experience. Additionally, users benefit from a consolidated audit trail that tracks all control activities conducted, enhancing accountability and transparency. This combination of features positions organizations to thrive in an increasingly digital landscape.
  • 14
    R&S®Browser in the Box Reviews

    R&S®Browser in the Box

    Rohde & Schwarz Cybersecurity

    Rohde & Schwarz Cybersecurity's R&S®Browser in the Box effectively blocks malware from infiltrating your PC and network infrastructure. This solution employs a groundbreaking method by entirely isolating the browser from the operating system of the computer. It operates within a virtual machine (VM), ensuring complete separation at the computer level, which safeguards user devices and corporate networks from malware. With Browser in the Box, users benefit from proactive defense against cyber threats. The secure disconnection of the browser from the rest of the PC shields both individuals and corporate networks from various threats, including Trojan horses, ransomware, advanced persistent threats (APTs), and zero-day vulnerabilities. Moreover, it mitigates risks associated with Java, JavaScript, Flash, and the opening of potentially harmful links, providing users with peace of mind while browsing the internet. In this way, businesses can maintain their operational integrity without compromising security.
  • 15
    Tintri IntelliFlash Reviews
    Innovative businesses opt for Tintri IntelliFlash due to its unparalleled storage options and user-friendly management capabilities, which come with a comprehensive licensing structure that requires minimal expertise. By consolidating all applications onto a singular unified storage platform, organizations can enhance operational efficiency and achieve significant savings in total cost of ownership while benefiting from simultaneous multimedia and multi-protocol functionality. The integration of AI-powered analytics and self-managing workload optimization streamlines IT operations, resulting in a superior experience for users. Moreover, IntelliFlash's cloud-based intelligent analytics gathers extensive data from connected systems, encompassing factors such as capacity utilization, configuration specifics, and overall system health and performance metrics. This AI-enhanced data examination not only uncovers issues but also discerns patterns that can forecast future trends, empowering businesses to make informed decisions and optimize resource utilization effectively. Ultimately, embracing Tintri IntelliFlash positions companies to thrive in a competitive landscape by leveraging cutting-edge technology and insights to drive growth.
  • 16
    InfiniBox Reviews
    The InfiniBox® enterprise storage solution offers performance that surpasses all-flash systems, along with multi-petabyte capacity and unwavering 100% availability, accommodating a diverse array of mixed application workloads. It includes features such as infinite zero-impact snapshots, reliable active/active configurations, synchronous and asynchronous replication, and a flexible, software-defined quality of service, all ensuring robust reliability and data security. By utilizing InfiniBox, enterprise IT departments and managed service providers can not only meet but exceed their service level goals while significantly reducing both the costs and complexities associated with storage management. Customers of Infinidat frequently achieve remarkable consolidation by migrating entire rows of outdated enterprise storage systems into a single InfiniBox solution, resulting in a dramatic 10:1 decrease in both network port expenses and floor tile usage. Furthermore, InfiniBox effectively curtails the proliferation of storage arrays and filers, enabling operations and capacity planning teams to take advantage of the efficiencies offered by large-scale, unified data center storage pools. This innovative approach ultimately streamlines operational processes and enhances overall efficiency.
  • 17
    QANplatform Reviews
    Developers and businesses have the opportunity to create Quantum-resistant smart contracts, decentralized applications (DApps), DeFi solutions, NFTs, tokens, and Metaverse projects using the QAN blockchain platform in any programming language they prefer. QANplatform stands out as the first Hyperpolyglot Smart Contract platform, allowing developers to write in various programming languages while also earning rewards for producing high-quality, reusable code. The threat posed by quantum computing is significant, and current blockchain technologies are unable to provide adequate protection against it. In contrast, QAN has been designed from the ground up to be resilient to these threats, ensuring the safety of your future assets. Quantum-resistant algorithms, which are referred to as post-quantum, quantum-secure, or quantum-safe, are cryptographic methods specifically formulated to counteract potential attacks from quantum computers. Embracing these advanced algorithms is essential for securing digital assets in an evolving technological landscape.
  • 18
    Magnus Box Reviews
    With industry-leading security and support, deploy and scale backups for clients. You pay nothing extra for data usage, and we charge a flat monthly fee per device. The Magnus Box team has been HIPAA-certified and trained. All data is encrypted and no personal information is exposed. These are the reasons Magnus Box was built. We tried several backup solutions but they either limit the amount of data you can back up or are too difficult or clunky. Magnus Box fills those gaps by being simple to use and allowing unlimited storage. Magnus Box is only available to technology service providers, computer repair professionals, and MSPs around the world. Magnus Box will not be sold directly to the public. Why are we doing this? We do this because we are there with you, trying to provide services for our clients while our providers were directly competing. Our team has extensive experience in the MSP industry.
  • 19
    PetaSAN Reviews
    PetaSAN is an advanced scale-out storage solution that operates in an active/active manner, delivering impressive scalability and performance. By leveraging contemporary cloud technologies, PetaSAN enables the seamless expansion of the storage cluster simply by integrating additional nodes at any time without causing disruptions to ongoing operations. Despite the complex underlying technologies it employs, PetaSAN offers a cohesive solution that is straightforward to install and manage. Its user-friendly graphical interfaces make it accessible for individuals who are not Linux administrators while still granting full control to experienced Linux users if desired. PetaSAN effectively incorporates proven technologies that support some of the largest cloud infrastructures today, utilizing intuitive point-and-click interfaces. At its core, PetaSAN is powered by the Ceph storage engine, an innovative open-source software-defined storage solution that serves as the backbone for numerous private and public cloud platforms. This combination of ease of use and robust performance makes PetaSAN a compelling choice for organizations looking to enhance their data storage capabilities.
  • 20
    LogMan.io Reviews
    TeskaLabs Logman.io serves as a cutting-edge and efficient solution for managing logs, which includes their collection, archiving, and analysis. This scalable log management system can seamlessly transition to the comprehensive TeskaLabs SIEM (security information and event management) tool. By utilizing this tool, you can maintain an advantage over potential security threats while gaining a complete understanding of your IT infrastructure's safety. The timely and precise detection of threats offered by TeskaLabs Logman.io safeguards critical data and sensitive information effectively. As a company specializing in cybersecurity, TeskaLabs ensures that all its products align with your organization’s security standards. Furthermore, Logman.io facilitates compliance with regulations pertaining to cybersecurity and GDPR, adapting effortlessly to your evolving requirements. This adaptability means that it can be easily upgraded to TeskaLabs SIEM. Ultimately, you will obtain a centralized and essential overview of your entire IT infrastructure, along with a robust toolset for threat modeling, risk management, and vulnerability assessment, enhancing your security posture significantly.
  • 21
    TeskaLabs SIEM Reviews
    Introducing a cutting-edge solution designed for managing security information and event processes, this advanced surveillance system empowers users to effortlessly oversee, analyze, and document security incidents in real time. TeskaLabs SIEM provides a comprehensive view of your entire organizational infrastructure, enabling early detection of threats, which aids in mitigating risks and minimizing their impact on your business operations. By staying ahead of potential security challenges, TeskaLabs SIEM guarantees you maintain complete oversight of your security landscape. As a leader in cybersecurity, TeskaLabs ensures that all its offerings adhere to the highest security standards tailored to your organization’s specific needs. Moreover, TeskaLabs SIEM facilitates compliance with critical regulations concerning Cyber Security, GDPR, and ISO 27001:2013, ensuring your organization meets essential legal requirements. The automated detection and reporting features for recognized incidents and irregularities enable swift responses, allowing for prioritized action on various issues. Ultimately, this efficiency not only saves valuable time but also empowers you to proactively seek out and address emerging threats, fostering a more secure business environment.
  • 22
    Unisys ClearPath Forward MCP Reviews
    For computing needs that require the highest levels of security, resilience, availability, and scalability while ensuring maximum business agility, ClearPath Forward serves as a key platform for simplification, cost management, and digital transformation. Enhance your workforce, improve efficiency, and accelerate the digital transformation of your ClearPath Forward environment through a managed service solution with cloud hosting that is expertly managed, maintained, and optimized by Unisys. Develop a clear and actionable plan that details how to adapt your applications to meet evolving demands with the assistance of ClearPath Forward Advisory Services and ClearPath Forward Application Evolution Services. Take advantage of a comprehensive array of advisory and implementation services designed to facilitate the smooth transition of your ClearPath Forward environment to either private or public cloud solutions, ensuring that you remain competitive in a rapidly changing market. By leveraging these services, organizations can achieve a seamless integration of their systems into the modern cloud landscape.
  • 23
    Accops Digital Workspace Reviews
    The modern workplace has evolved into a hybrid model, with a significant portion of employees working remotely, accessing essential business applications and data from diverse locations and utilizing various devices in unique ways. Consequently, organizations worldwide are striving to shift from traditional hardware-centric IT frameworks to entirely software-defined infrastructures. Their goal is to empower employees to maintain productivity, security, and a seamless experience, irrespective of their physical locations or the devices and networks they engage with. However, they face numerous challenges, including concerns over data security, the complexities of IT infrastructure, and the rising costs related to establishing a robust digital workspace. In response to these challenges, Accops Digital Workspace offers a comprehensive end-user computing solution grounded in zero-trust principles, facilitating secure and immediate access to business applications from any location, device, or network. The suite of solutions provided by Accops also encompasses virtualization for end-user computing, ensuring that users have a reliable and efficient experience tailored to their needs. This innovative approach not only addresses the immediate demands of the hybrid workforce but also sets the stage for future advancements in digital work environments.
  • 24
    Accops HyWorks Reviews
    Accops HyWorks empowers today’s workforce with the ability to work flexibly and dynamically from any location, device, and time, significantly boosting job satisfaction and engagement among employees. This all-encompassing solution streamlines the management and security of applications, devices, and networks, ensuring that employees have safe and seamless access to the essential tools they need to excel in their roles. Furthermore, its centralized endpoint management simplifies the oversight of all devices, virtual desktops, and applications from a single point, making it incredibly efficient. Not only does HyWorks foster a secure work environment, but it also alleviates complexities that can distract employees from their core business functions, allowing them to channel their creativity more effectively, which in turn enhances productivity and lowers costs. By virtualizing and delivering desktop applications from a centralized data center, organizations can maintain control over every device, app, and operating system within their network, effectively preventing potential security breaches. The result is a harmonized workplace where technology enhances rather than hinders business operations.
  • 25
    Barracuda Intronis Backup Reviews
    Barracuda Intronis Backup – MSP is a software-based backup and disaster recovery (BDR) solution that aims to enhance customer value by safeguarding essential data while simultaneously providing avenues for profit expansion and business growth. The combination of Intronis Backup and the ECHOplatform offers a comprehensive software-only approach that surpasses basic file-and-folder backups, delivering secure hybrid solutions for local and cloud data protection, all wrapped in a straightforward pricing model along with a unified management interface. With a predictable fixed cost per small and medium-sized business (SMB) site, Intronis Backup ensures financial stability for managed service providers (MSPs). This fixed pricing structure not only facilitates margin development for MSPs but also positions data protection as a catalyst for business growth. Additionally, Intronis Backup comes equipped with essential management and reporting tools tailored to effectively support SMBs, and MSPs can further enhance their operational efficiency through seamless integrations with key business applications. As a result, the solution empowers MSPs to streamline their processes while focusing on delivering exceptional service to their clients.
MongoDB Logo MongoDB