Best IT Security Software for Microsoft Hyper-V

Find and compare the best IT Security software for Microsoft Hyper-V in 2024

Use the comparison tool below to compare the top IT Security software for Microsoft Hyper-V on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Comet Backup Reviews
    Top Pick

    Comet Backup

    $19 per month
    195 Ratings
    See Software
    Learn More
    Start running backups and restores in less than 15 minutes! Comet is a fast, secure all-in-one backup platform for businesses and IT providers. You control your backup environment and storage destination (local, Wasabi, AWS, Google Cloud Storage, Azure, Backblaze, or other S3 storage providers). Our software supports businesses across 120 countries in 13 languages. Test drive Comet Backup with a 30-day FREE trial!
  • 2
    Relianoid Reviews

    Relianoid

    Relianoid

    $1,356 one-time payment
    2 Ratings
    Our ADC solution is designed to take your online services to new levels of performance, security, and reliability. It ensures seamless traffic distribution and resource utilization as well as enhanced protection against cyber threats. Our ADC solution provides you with massive scalability and high availability for your services, apps, and networks. Multi-core compatibility, unlimited throughput, connections and farms, and optimized to support multi-core. Installation is not required, allowing for a rapid consolidation of production and a seamless deployment. Integrate easily into your infrastructure for a cost-saving and productive setup. Shared hardware resources can reduce costs associated with physical equipment, making this a budget-friendly solution. Ready for 64-bit platforms to provide better performance, and a robust environment. It allows for more performance resources than other architectures.
  • 3
    Vinchin Backup & Recovery Reviews
    Top Pick
    Vinchin Backup & recovery, a comprehensive, next-generation backup solution developed by Vinchin itself, supports the most popular virtual environments in the world, including VMware, Hyper-V and XenServer. It also supports databases such as Oracle DB and MySQL, SQL Server and PostgreSQL. It also supports cloud archive, offsite copies, ransomware protection, and other data security features. It prevents loss of important business data due human error, viruses, attacks on hardware, natural disasters and wars.
  • 4
    Carbonite Reviews

    Carbonite

    Carbonite

    $6 per month
    5 Ratings
    Protect your business's most important data. Automatic cloud backup provides reliable and easy data protection and recovery. Carbonite Safe™, a data backup solution, is designed for companies like yours. It's easy to use and install, so you don’t need to have any IT skills to ensure that your data is secure and accessible. You can protect files on servers, external storage devices, as well as up to 25 computers. File recovery is easy for ransomware infected computers. You can monitor online backups and access files from any device through a secure web-based dashboard. Meet data retention requirements. Cloud backup for businesses that meets your requirements. It doesn't matter if you need to restore a single file or an entire folder system. Just a few clicks and you will be on your way. Advanced encryption ensures that your data is protected in transit and storage. Support is charged by other companies at an additional cost. Carbonite Safe supports our award-winning team.
  • 5
    Faddom Reviews

    Faddom

    Faddom

    $1 per node per month
    3 Ratings
    Faddom's software for application dependency mapping uses network traffic protocols in order to automatically map all cloud and on-prem platforms. Get a 24/7, real-time holistic view of all hybrid servers, applications and dependencies. Lightweight. No agents. No credentials. No firewalls. Pricing starts at $1 per node per month. Free for 30 days. Trial is free with no credit card.
  • 6
    NAKIVO Backup & Replication Reviews

    NAKIVO Backup & Replication

    NAKIVO

    $229/ socket; $25 workload/y
    NAKIVO Backup & Replication provides a top-rated, fast, and affordable backup, ransomware recovery, and disaster recovery solution that works in virtual, physical and cloud environments. The solution provides outstanding performance, reliability and management for SMBs, enterprises and MSPs.
  • 7
    NovaBACKUP for Servers Reviews

    NovaBACKUP for Servers

    NovaBACKUP Corporation

    $399.95 /year
    Protect your business from data loss with fast, affordable Windows Server backup software with full disaster recovery protection plus local and offsite cloud backup storage with support for SQL, Exchange, and virtual machines. Instantly recover your entire system in just minutes and reduce your exposure to critical downtime. Backups utilize up to AES 256-bit encryption. NovaBACKUP Server Agent comes with 250 GB of Cloud Storage, Free Upgrades, Support, and Setup Assistance, so you can be sure that the software is configured in the best possible way for your environment.
  • 8
    Metallic Reviews
    As a service, you get simple, smart, and secure data protection. Metallic is the best choice for hybrid cloud services, whether you need it on-premises or SaaS. You can trust Metallic to provide data protection that matches your hybrid cloud strategy. Only SaaS data protection service that covers all hybrid workloads. Your containers are protected at all times. Protect what is most important against corruption and deletion across all of Microsoft Office 365. This integrated protection solution is simple, flexible and comprehensive. It covers all your structured data needs. Endpoint protection has never been easier or more simple. With automated backups and flexible, granular restoration, it's now possible to protect your data. What would you think if you could reduce storage costs on-premises, maintain compliance, and do it all quickly? Customers of Commvault and Metallic get fully-managed cloud storage that can be used for a wide range of workloads through a single interface.
  • 9
    VyOS Reviews

    VyOS

    VyOS Networks

    $1000
    Open source software and a universal router are key to democratizing the way we access networks. VyOS' vision is to revolutionize how we access networks, so that everyone can build the solutions they have always wanted, without limitations, restrictions, or prohibitive prices. We believe that internet access is just as important to human development as food, water, air, and healthcare. VyOS was founded by engineers for engineers. It is an open-source software company that makes it possible to access networks without restrictions or prohibitive fees. Through our open-source software and virtual platforms, we do this as VyOS. Stateful firewalls, zone based firewall, all types source and destination NAT (one-to-one, one-to many, many to many). For auditing, creating customized images and contributing, everyone has access to the entire codebase and build toolchain.
  • 10
    Z1 SecureMail Gateway Reviews

    Z1 SecureMail Gateway

    Zertificon

    from $ 1.50 per user/per month
    25% of the top 100 German companies with the highest turnover choose Zertificon's solutions. We make Enterprise Email Encryption effortless for secure communications with anyone, anywhere, with our Z1 SecureMail Gateway solution. Your entire organization encrypts and decrypts, just as well manages and verifies email signatures smoothly in the background. Z1 SecureMail Gateway requires very little maintenance. Furthermore, the browser-based admin interface does not call for any special skills. Keys are managed automatically, and security policies are centrally enforced. Integration into your cloud or on-premises email infrastructure is quick and straightforward. Your business and workflows are uninterrupted – no employee training is required, and recipients get a frictionless experience. Encryption is centrally customizable and proofed against human error with Z1 SecureMail Gateway. You can quickly establish and maintain compliance and the highest levels of security. You also own your encryption keys and get German-engineered data sovereignty with no backdoors.
  • 11
    CyberQP Reviews

    CyberQP

    CyberQP

    $300 per month
    We provide MSPs with privileged access management, including the protection of customer admin accounts and the security of their customers' identities. CyberQP believes that MSPs can be the only solution for small and medium business cyber security problems. We take our partnership with MSPs very seriously. Create accounts and passwords when technicians need them, with zero-standing privilege and advanced security. Automate tasks, manage admin and service accounts, and automate tasks across environments. Verify the identity of those who call your helpdesk in less than 30 second to protect organizations from internal and outside threats. Your MSP technicians can manage and control who is granted privileged access during specified time periods. MSPs can find it difficult to discover admin accounts and privileged access across their customer base. Our automation makes it easy.
  • 12
    SecureDoc CloudVM Reviews
    WinMagic's SecureDoc CloudVM product is the best in the industry for full disk encryption and intelligent key management. It protects your data in hybrid, private, and public cloud environments. It protects your volume and all disk encryption keys. SecureDoc CloudVM offers the most extensive support for virtualized servers and public and private Clouds. This allows you to create a unified encryption strategy across any endpoint, virtualized, or cloud IaaS environment. SecureDoc CloudVM provides a single platform and pane-of-glass that increases enterprise security, ensures encryption compliance and reduces complexity. It also eliminates silos within your organization. SecureDoc by WinMagic will give you the convenience and control of all aspects of data security.
  • 13
     Acronis Cyber Protect Cloud Reviews
    Your clients will be less affected by downtime and data loss at a lower price. Acronis Cyber Protect Cloud is unique in that it seamlessly integrates cybersecurity, management, and data protection to protect endpoints, systems, and data. This synergy reduces complexity so service providers can better protect customers while keeping costs low. Next-generation cybersecurity. Advanced AI-based behavioral detection engine to prevent zero-day attacks. Reliable backup and recovery. Backup of full-image and file-levels, disaster recovery, metadata collection, and backup of files and other data for security forensics. MSP-ready protection management. URL filtering, vulnerability assessments, patch management are all available for increased control. Traditional endpoint protection products are not integrated and require more time to manage - updating and patching, maintaining licenses, checking compatibility after updates, managing multiple policies through a variety of user interfaces, and managing multiple policies.
  • 14
    Centreon Reviews
    Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure.
  • 15
    StorMagic SvKMS Reviews
    We believe that enterprises should have a single point of contact for key management. SvKMS is a single platform that can manage all your encryption keys from anywhere. Customers receive an enterprise key manager that can manage any encryption workflow, at the edge, cloud, data center, or cloud. SvKMS offers enterprise-grade features in an easy to use interface at a surprising low cost. You can deploy anywhere, have high availability without borders, and integrate with any workflow. Advanced key management, powerful reports & authorization, lowest price on large scale. Easy configuration, simple administration, centralized management All encryption key management processes can be unified in a single virtual appliance. SvKMS provides a wide range of risk reduction options via GUI, integrated REST API-enhanced workflows, and KMIP standardization. SvKMS allows for rapid customization, dashboard auditing, and monitoring for all deployment scenarios.
  • 16
    MyGlue Reviews

    MyGlue

    IT Glue

    $29 per month
    MyGlue is a collaboration and intranet platform that creates a direct communication channel with users. Leave behind insecure email exchanges and unreliable conversations. IT professionals are managing more devices, data, and users than ever before. You can easily and securely collaborate with users and share IT documentation using a collaboration platform. MyGlue has many features that you will recognize from IT Glue. MyGlue offers everything your users need to manage passwords and process documents, including checklists, audit trails, version histories, and SOC 2 Compliance. The MyGlue Help Center makes it easy to share documents, such as "how-to"s. Enjoy a holistic management approach to communications, documentation and password management throughout the organization and across all teams.
  • 17
    AVANU WebMux Reviews
    AVANU's WebMux Network Traffic Manager ("WebMux") offers a cost-effective, full-featured enterprise-class load-balancing solution. WebMux integrates the application delivery network (ADN), global server load balancing, (GSLB), and its built-in FireEdge™ for Apps Web Application Firewall. WebMux has been in development since 1987. It uses complex algorithms to develop network designs that require load balance flexibility to manage and meet the most stringent network traffic demands. It manages, controls and secures local network traffic to ensure high availability of applications. This includes reliable peak performance, affinity services, geographic disaster recovery, and enhanced applications security firewall capabilities. WebMux's user-friendly menu-driven interface is easy to use and manage.
  • 18
    FortiGate SWG Reviews
    Secure Web Gateway (SWG), enterprise-class protection against web-borne threats Secure Web Gateway (SWG), solutions use web filtering in order to enforce company Internet access policies. They can also filter unwanted software, including malware, from user-initiated Internet connection. SWGs are vital as enterprises continue to improve their WAN Edge. Applications are moving to the cloud rapidly, and the attack surface at branch locations and remote sites is increasing. Security risks are particularly high for web-based traffic. As attack techniques improve, organizations require an integrated approach to protect against both internal and external risks. URL filtering, application control and deep HTTPS/SSL inspection are all part of an SWG solution. Data loss prevention and remote browser isolation capabilities are also included. Flexible deployment options are available with Fortinet's SWG, including explicit, transparent and inline modes.
  • 19
    KeyTalk Reviews
    KeyTalk is independent from Certificate Authorities and linked with a large number public CAs, both Digicert QuoVadis and GMO GlobalSign. Even though there are thousands of certificates and endpoints involved, switching between CAs is easy and straightforward. This means that vendor lock-in is no longer possible. KeyTalk has an internal CA that generates private certificates and keys. Have you ever used public certificates that were expensive for internal purposes? Did you find it difficult to use Microsoft CS or other private CAs for internal purposes? You will love our internal CA, private PKI certificate issuing. KeyTalk tracks the lifecycle of certificates in an automated manner. This allows you to have a complete overview of all certificates, including their validity, SAN, and name. You can also include used crypto keys and algorithms for internal and external certificates.
  • 20
    MaxPatrol Reviews

    MaxPatrol

    Positive Technologies

    MaxPatrol is designed to manage vulnerabilities and compliance in corporate information systems. MaxPatrol's core features include penetration testing, system checks, compliance monitoring, and system checks. These mechanisms provide an objective view of IT security infrastructure and granular insight at department, host and application levels. This information is essential to quickly identify vulnerabilities and prevent attacks. MaxPatrol makes it easy to keep a current inventory of IT assets. You can view information about your network resources (network addresses and OS), identify hardware and software that are in use, and track the status of updates. It can also monitor changes to your IT infrastructure. MaxPatrol does not blink when new hosts and accounts are created, or when hardware and software are upgraded. Information about the security of infrastructure is quietly collected and processed.
  • 21
    Airlock Reviews
    Airlock's Secure Access Hub protects apps, APIs, and data from identity theft. Airlock combines security and convenience. It offers customers a seamless customer journey with single sign-on, social login, comprehensive user self service, consent management, and comprehensive user self-services. Reacting quickly is key to being in tune with the market. The Airlock Secure Access hub provides all necessary security functions, including registration, authentication, and self-services. You can focus all your IT resources on your business processes so you can use your IT resources more effectively. The Airlock Secure Access hub helps you meet all international compliance standards, including GDPR, PSD2, PCI–DSS and OWASP. The compliance of regulations is made easier by the inclusion of access policies onto applications and services.
  • 22
    Diladele Web Filter Reviews
    The user attempts to access a website via the Internet. The browser connects to the site directly or via explicitly set proxy settings. Remote site responses and requests are sent to Squid. They are authenticated and redirected either locally or remotely to Web Safety ICAP filter. Based on the policy settings, requests and responses are reviewed and access to information is granted or denied. The database stores information about each request and response. Web Safety is an ICAP web filter which plugs directly into Squid proxy. This allows it filter URLs and to inspect encrypted HTTPS traffic. It is easy to block encrypted explicit content. Deep content inspection of web pages is performed and all links to inappropriate content and explicit language are blocked. All inappropriate content is also blocked on general purpose web sites like Google Search, Google Images and Bing.
  • 23
    Unitrends Security Manager Reviews
    Internal security threats account for more than 70% of cyber security incidents. These include misconfigurations and unauthorized logins. Internal security gaps can be exploited by hackers to steal data and cause havoc that is not detected. Unitrends Security Manager alerts you to potential threats before hackers can gain access. Unitrends Security Manager scans all your servers, networks, and data every 24 hours and alerts you to any internal threats. The report contains all alerts and can be sorted by severity/priority or type. Alert reports can be sent to any number of email addresses, including your ticketing system. Unitrends Security Manager has "smart tags", a feature that allows it adapt to each client. Smart tags enhance the detection system by adding information on specific users, assets, or settings.
  • 24
    Palo Alto Networks Panorama Reviews
    Panorama™, a centralized management tool that is easy to use, provides insight into network traffic and simplifies configurations. From one central location, you can create and edit security rules that are consistent with your organization's security policy. The Application Command Center (ACC), which provides comprehensive security management and protection, gives you visibility and actionable insights to network traffic and threats. The automated correlation engine can be used to reduce data clutter and help you identify compromised hosts and spot malicious behavior faster. You can manage up to 5,000 Next-Generation Firewalls or use the Panorama Interconnect plugin for centralizing configuration management for tens to thousands of devices. Panorama simplifies security with an intuitive user interface that allows you to monitor, configure, and automate security management.
  • 25
    Commvault Backup & Recovery Reviews
    You can ensure data availability across all workloads, both in cloud and on-prem environments. Commvault®, Backup & Recovery ensures data availability from one interface, regardless of where it is located. You can say goodbye to data loss, data silos, inefficient scaling, and missing recovery SLAs. Empower your team to do more. Comprehensive workload coverage (files and apps, databases, virtual, containers, and cloud) all from one extensible platform. You can quickly and easily recover data and applications. Virtual machines can also be recovered instantly. Easily back up, recover, and move data and workloads to/from/within/between clouds. Storage integrations allow for high-performance backups. Ransomware protection with anomaly detection and reporting. Reduce costs by requiring minimal infrastructure in the cloud or on premises. Policy-driven automation allows you to optimize the cloud vs. on-premises data location and workloads.
  • Previous
  • You're on page 1
  • 2
  • Next