Best IT Security Software for Nutanix AHV

Find and compare the best IT Security software for Nutanix AHV in 2025

Use the comparison tool below to compare the top IT Security software for Nutanix AHV on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    KACE by Quest Reviews

    KACE by Quest

    Quest Software

    As low as $3/mo/device
    2 Ratings
    KACE is an endpoint management solution that offers a single point of control for managing IT systems across the entire organization. From initial deployment to ongoing maintenance, KACE is designed to fulfill all endpoint security and deployment needs—helping businesses quickly deploy, monitor, and manage their devices using a unified inventory database. KACE improves device security with on-demand hardware and software discovery, patch management, compliance reporting, and real-time monitoring of mobile endpoints. KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more. Unified Endpoint Management by KACE. Where Next Meets Now.
  • 2
    Pandora FMS Reviews
    Top Pick
    With more than 50,000 customer installations across the five continents, Pandora FMS is a truly all-in-one monitoring solution, covering all traditional silos for specific monitoring: servers, networks, applications, logs, synthetic/transactional, remote control, inventory, etc. Pandora FMS allows you to quickly find and solve problems. It scales them so that they can be derived either from on-premise, multi-cloud, or both. You now have the ability to use your entire IT stack and analytics to solve any problem, even those that are difficult to find. You can control and manage any technology and application with more than 500 plugins, including SAP, Oracle, Lotus or Citrix, Jboss, VMware, AWS and SQL Server.
  • 3
    NAKIVO Backup & Replication Reviews

    NAKIVO Backup & Replication

    NAKIVO

    $229/ socket; $25 workload/y
    NAKIVO Backup & Replication provides a top-rated, fast, and affordable backup, ransomware recovery, and disaster recovery solution that works in virtual, physical and cloud environments. The solution provides outstanding performance, reliability and management for SMBs, enterprises and MSPs.
  • 4
    Edgenexus Load Balancer (ADC/WAF/GSLB) Reviews
    We offer the most user-friendly technology without sacrificing performance or features. We back it up with exceptional support and care delivered under a fair, cost-effective pricing model Our technology is used by small startups with big ideas, small budgets, and global enterprises. We love them all! Easy to use Load balancing, WAF, GSLB and SSO/Pre-Authentication. It is also the only true ADP Application Delivery Platform that allows for the enhancement of functionality and longevity using the app store or apps you create in-house.
  • 5
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 6
    MinerEye DataTracker Reviews

    MinerEye DataTracker

    MinerEye

    $2000/1TB/month
    MinerEye's DataTracker helps organizations overcome the information governance/protection challenge. It automatically scans, indexes and analyzes all unstructured and dark data in an organization's data repository. The solution uses proprietary Interpretive AI™, computer vision, and machine learning to locate relevant files from the billions of stored data. It automatically sends out alerts with the next best action recommendations in case of conflicts, duplicates, or potential violations. This allows data protection to be greatly enhanced and operational costs reduced.
  • 7
    VaultCore Reviews

    VaultCore

    Fornetix

    $1,118 per year
    VaultCore™ is a next-generation, highly scalable enterprise key management solution from Fornetix®. It integrates seamlessly with existing platforms, automates policy, and empowers administrators with a centralized, organized control that can be easily applied across all environments. Request a demo to experience VaultCore's products: - Quick, seamless integration with existing technology - Separation Of Duties (a best practice). - Powerful automation allows for centralized control of policy - Increased security of data in motion, at rest, and in use - Significant reduction in the costs associated with data breaches -- lost businesses, recovery time, reputational damage - Simplified compliance, regulatory enforcement - Scalable to more than 100 million keys (more that enough to meet any industry or government's requirements) - Reporting capabilities to meet compliance requirements - Ease in Use
  • 8
    VyOS Reviews

    VyOS

    VyOS Networks

    $1000
    Open source software and a universal router are key to democratizing the way we access networks. VyOS' vision is to revolutionize how we access networks, so that everyone can build the solutions they have always wanted, without limitations, restrictions, or prohibitive prices. We believe that internet access is just as important to human development as food, water, air, and healthcare. VyOS was founded by engineers for engineers. It is an open-source software company that makes it possible to access networks without restrictions or prohibitive fees. Through our open-source software and virtual platforms, we do this as VyOS. Stateful firewalls, zone based firewall, all types source and destination NAT (one-to-one, one-to many, many to many). For auditing, creating customized images and contributing, everyone has access to the entire codebase and build toolchain.
  • 9
    WatchTower Security Management App Reviews
    You can monitor your network using Check Point's WatchTower Security Management App and respond quickly to security threats from anywhere with your mobile phone. The intuitive WatchTower Security Management App allows you to monitor your network in real time, alerts you when it is at risk, and configure security policies for multiple gateways. You can view all devices connected to your network as well as any security threats. Real-time notification for malicious attacks and unauthorized device connections. Block malware-infected devices quickly and view details to assist with further investigation. You can customize notifications to your top security events. You can view all security events by category. Click the link to drill down for more information. You can configure security settings for multiple gateways. Securely manage advanced security policy settings via the web user interface.
  • 10
    Multi-Domain Security Management Reviews
    Multi-Domain Security Management provides more security and control by dividing security management into multiple virtual realms. Virtual domains can be created by businesses of any size based on business unit, geography, or security function. This will simplify management and strengthen security. Allows for the isolation of roles and granular administration of multi-tenant security management architectures. One security management configuration for VPN and Firewall, IPS, or other protections. All network security management domains can be viewed, accessed and controlled from one console. Multiple administrators can be created and centrally managed in multi-domain security management environments. Administrators can be granted permission to manage specific domains and other aspects of the multidomain system. Multiple administrators can work simultaneously on different security management domains.
  • 11
    Thunder TPS Reviews
    Thunder TPS is used by top service providers and online gaming businesses. It provides automated DDoS protection that is scalable and automated. It uses advanced machine learning to detect attacks and mitigate them. Multi-modal source-based defense identifies attackers without causing damage to users. 5-level adaptive mitigation policy, zero day Automated Protection (ZAP), actionable distributed-denial-of-service weapons intelligence at a scale 96M-entry white/black lists Flexible and robust Distributed Denial of Service protection (DDoS), with a wide variety of hardware and software deployment options to meet your specific needs. High-precision, automated DDoS mitigation solution can be delivered as hardware or virtual appliances in speeds ranging from 1 Gbps up to 500 Gbps. High-performance, Sflow-based, IPFIX-based DDoS detection for a complete reactive cyber attack defense system. This appliance can be used as a standalone appliance, or integrated with aGalaxy 5000.
  • 12
    GigaSECURE Reviews
    The GigaSECURE®, Security Delivery Platform, is a next-generation network packet brokers that focuses on threat prevention, detection and prediction. The right tools ensure that the right traffic is delivered at the right time every time. To keep up with the increasing network speed, enable network security tools. Gain insight into network traffic. Optimize and provide relevant data for tool usage. Lower tool sprawl and costs. Your overall security posture is improved by efficient prevention and rapid detection and containment. Threats are not in danger. GigaSECURE allows security teams to gain broad access to and control network data from any location. It can be customized to extract specific applications sessions, metadata, and decrypted data. This architecture allows security tools to operate inline and out-of-band at peak performance, without compromising network resilience or speed.
  • 13
    Junos Traffic Vision Reviews
    Junos Traffic Vision, a licensed traffic sampling app for MX Series 3D Universal Edge Routers, is available. It provides detailed information on network traffic flows, which is useful for many operations and planning activities. Junos Traffic Vision monitors packets while they are being processed by the router and captures information such as source and destination addresses, packet count information, and packet and byte count information. These details are gathered and exported in a standards-based format to allow Juniper and third-party tools to analyze and present them. This includes usage-based accounting, traffic profiling and traffic engineering. Junos Traffic Vision is a high-performance, scale implementation that can be used inline or on service cards. It can be used alongside lawful intercept filtering or port mirroring without affecting performance.
  • 14
    Check Point Infinity Reviews
    In an effort to provide better protection, organizations often implement multiple cyber security solutions. They often end up with a patchwork security system that is costly and leads to high TCO. Businesses can take preemptive measures against advanced fifth-generation attacks by adopting a consolidated security strategy with Check Point Infinity architecture. This allows them to achieve a 50% increase in operational efficiency, and a 20% reduction in security cost. This is the first consolidated security architecture that spans networks, cloud, mobile, and IoT. It provides the highest level of threat prevention against known and unknown cyber-threats. 64 threat prevention engines that block known and unknown threats powered by threat intelligence. Infinity-Vision, the unified management platform of Check Point Infinity is the first modern, consolidated cybersecurity architecture designed to protect today's most sophisticated attacks on networks, endpoints, and cloud.
  • 15
    Check Point IPS Reviews
    Intrusion Prevention Systems detect and prevent attempts to exploit vulnerabilities in vulnerable systems or applications. They protect you from the latest breaking threat. Our Next Generation Firewall automatically updates the Check Point IPS protections. Your organization is protected regardless of whether the vulnerability was discovered years ago or just a few seconds ago. Check Point IPS provides thousands of behavioral and signature preemptive protections. Our acceleration technologies allow you to safely enable IPS. Your staff will save valuable time with a low false positive rate. IPS can be enabled on any Check Point security gateway to reduce total cost of ownership. Enterprises can get cloud-level expansion and resilience on their premises with this on-demand hyperscale threat prevention service. Users can access corporate networks and resources remotely from anywhere they are.
  • 16
    Netwrix Password Policy Enforcer Reviews
    Password policy enforcer by Netwrix will frustrate hackers, satisfy auditors, and delight users. Weak and leaked passwords are a major problem in IT networks. They make it easy for hackers to gain access to sensitive data, damage computers, and release ransomware. Unfortunately, native Windows tools are often unable to deliver the detailed configurations, rules, and policies required for modern password policy, leaving IT teams struggling with the evolving threat landscape and evolving requirements. Users are frustrated and IT helpdesks overloaded as they struggle to understand the requirements for new passwords. Learn how Netwrix Password Policy Enforcer helps you achieve effective password enforcement with no hassle.
  • 17
    HyTrust Reviews
    Organizations face the daunting task of addressing inconsistencies and gaps in policy enforcement in a multi-cloud environment. HyTrust CloudControl offers advanced privileged user access control, policy enforcement and forensic compliance for private clouds. HyTrust DataControl offers powerful data-at rest encryption and integrated key management to protect workloads in any cloud environment. Enterprises can protect their data by encrypting workloads. Scaling the management of encryption keys is one of the biggest challenges in workload encryption. HyTrust's mission aims to make cloud infrastructure private, public, and hybrid more trustable for government agencies, service providers, and enterprises. HyTrust offers solutions that automate security controls to software-defined computing, networking, and storage workloads.
  • 18
    Sangfor Endpoint Secure Reviews
    Identify the threat's nature and respond quickly and flexible. Sangfor Endpoint Secure offers a different approach to protecting systems from malware and other types of threats than current next-generation Anti-virus solutions (NGAF) and endpoint detection & reaction (EDR). Endpoint Secure is part a fully integrated cooperative security solution that includes Sangfor's NGAF and IAM. This provides a holistic response to malware attacks and APT breaches throughout the entire organization's network. It also allows for easy management, operation and maintenance. The solution can be scaled to meet any organization's needs, whether they need on-premise or cloud management, as well as a hybrid solution. Endpoint secure integrates directly with the Sangfor NGAF. Improved real-time response to malware attacks. Quick identification and mitigation of malicious east-west (lateral propagation), and north-south(command & control). Comprehensive asset identification.
  • 19
    FaPipe IPVPN Reviews
    FatPipe IPVPN balances load between multiple managed and CPE based VPNs and dedicated private networks. FatPipe IPVPN provides an easy, low-cost migration route from private lines, frames, or point-to–point networks. You can combine multiple private, MPLS, or public networks without the need for additional equipment at the provider. FatPipe IPVPN allows you to use a CPE VPN or managed VPN service as a backup for your private line or frame relay. IPVPN can also be used to backup managed services with other providers as part of your disaster recovery or business continuity plan. FatPipe IPVPN, the only product of its type, works with multiple managed VPN service providers, CPE VPNs, private lines, and other providers to provide the highest level reliability, redundancy and speed for interoffice data transmissions.
  • Previous
  • You're on page 1
  • Next