What Integrates with Nutanix AHV?

Find out what Nutanix AHV integrations exist in 2025. Learn what software and services currently integrate with Nutanix AHV, and sort them by reviews, cost, features, and more. Below is a list of products that Nutanix AHV currently integrates with:

  • 1
    Inuvika OVD Enterprise Reviews
    Top Pick

    Inuvika

    $7.40/concurrent user/month
    40 Ratings
    Top Pick See Software
    Learn More
    Inuvika OVD Enterprise is a desktop virtualization solution that gives users secure access to their apps and virtual desktops from anywhere. Inuvika embraces the zero-trust principle, ensuring secure access and leaving no data on user devices. OVD Enterprise reduces complexity for admin and lowers the total cost of ownership by up to 60% when compared to Citrix or VMware/Omnissa Horizon. It can be deployed on-premise or through any private of public cloud platform provider. It is also available as a DaaS service through our network of Managed Services Providers. OVD is easy to install and manage. It integrates with leading enterprise standards, including any directory service, storage and hypervisors such as Proxmox VE, vSphere, Nutanix AHV and Hyper-V. Key Features: Use any device, including macOS, Windows, Linux, iOS/Android, Chromebook, Raspberry Pi, or any HTML5 Web browser. Multi-tenancy support Integrated Two-Factor Authentication Integrated Gateway enables secure remote access without a VPN Single Web-based Admin console Deploys on Linux so most Microsoft Windows server and SQL server licenses are not required. Hypervisor agnostic - ProxmoxVE, Hyper-V, vSphere, KVM, Nutaxix AVH and more.
  • 2
    Parallels RAS Reviews

    Parallels RAS

    Parallels

    $120 US/year/concurrent user
    426 Ratings
    See Software
    Learn More
    Parallels® RAS meets you where you are in your virtualization journey—bridging on-premises and multi-cloud solutions into a centralized management console for administrators and a secure virtual work environment for end users. Enjoy an all-in-one digital workspace and remote work solution that provides secure virtual access to business applications and desktops on any device or OS—from anywhere. Agile, cloud-ready foundation and end-to-end security fueled by a centralized management console with granular policies is at your fingertips. Take advantage of on-premises, hybrid, or public cloud deployments and integrate with existing technology like Microsoft Azure and AWS. Gain the flexibility, scalability, and IT agility you need to quickly adapt to changing business needs. Best of all, Parallels RAS offers a single, full-featured licensing model that includes 24/7 support and access to free training.
  • 3
    KACE by Quest Reviews

    KACE by Quest

    Quest Software

    As low as $3/mo/device
    2 Ratings
    KACE is an endpoint management solution that offers a single point of control for managing IT systems across the entire organization. From initial deployment to ongoing maintenance, KACE is designed to fulfill all endpoint security and deployment needs—helping businesses quickly deploy, monitor, and manage their devices using a unified inventory database. KACE improves device security with on-demand hardware and software discovery, patch management, compliance reporting, and real-time monitoring of mobile endpoints. KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more. Unified Endpoint Management by KACE. Where Next Meets Now.
  • 4
    SAP Data Warehouse Cloud Reviews
    Our unified cloud solution for data and analytics enables business users to connect data with business contexts and unlock insights. SAP Data Warehouse Cloud unites data and analytics in a cloud platform that includes data integration, data warehouse, data warehouse, as well as analytics capabilities. This will help you unleash your data-driven enterprise. Built on the SAP HANA Cloud database, this software-as-a-service (SaaS) empowers you to better understand your business data and make confident decisions based on real-time information. You can connect data across multi-cloud and local repositories in real time, while keeping the context of your business. SAP HANA Cloud enables you to gain insights and analyze real-time data at lightning speed. All users can access self-service capabilities to connect, model and visualize their data securely in an IT-governed environment. Use pre-built templates, data models, and industry content.
  • 5
    Pliant Reviews
    Top Pick
    Pliant's solution to IT Process Automation streamlines, secures, and simplifies the way teams build and deploy automation. Pliant will reduce human error, ensure compliance and increase your efficiency. Pliant allows you to integrate existing automation and create new automation using single-pane orchestration. You can ensure compliance with consistent, practical, built-in governance. Pliant has abstracted thousands from vendor APIs to create intelligent actions blocks that allow users to drag-and drop blocks rather than writing lines of code. Citizen developers can create consistent and meaningful automation across platforms and services in minutes. This allows them to maximize the value of the entire technology stack from one platform. We can add APIs in as little as 15 business days. This is an industry-leading timeframe.
  • 6
    Pandora FMS Reviews
    Top Pick
    With more than 50,000 customer installations across the five continents, Pandora FMS is a truly all-in-one monitoring solution, covering all traditional silos for specific monitoring: servers, networks, applications, logs, synthetic/transactional, remote control, inventory, etc. Pandora FMS allows you to quickly find and solve problems. It scales them so that they can be derived either from on-premise, multi-cloud, or both. You now have the ability to use your entire IT stack and analytics to solve any problem, even those that are difficult to find. You can control and manage any technology and application with more than 500 plugins, including SAP, Oracle, Lotus or Citrix, Jboss, VMware, AWS and SQL Server.
  • 7
    eG Enterprise Reviews

    eG Enterprise

    eG Innovations

    $1,000 per month
    3 Ratings
    IT performance monitoring does not just focus on monitoring CPU, memory, and network resources. eG Enterprise makes the user experience the center of your IT management and monitoring strategy. eG Enterprise allows you to measure the digital experience of your users and get deep visibility into the performance of the entire application delivery chain -- from code to user experiences to data center to cloud -- all from a single pane. You can also correlate performance across domains to pinpoint the root cause of problems proactively. eG Enterprise's machine learning and analytics capabilities enable IT teams to make smart decisions about right-sizing and optimizing for future growth. The result is happier users, increased productivity, improved IT efficiency, and tangible business ROI. eG Enterprise can be installed on-premise or as a SaaS service. Get a free trial of eG Enterprise today.
  • 8
    NAKIVO Backup & Replication Reviews

    NAKIVO Backup & Replication

    NAKIVO

    $229/ socket; $25 workload/y
    NAKIVO Backup & Replication provides a top-rated, fast, and affordable backup, ransomware recovery, and disaster recovery solution that works in virtual, physical and cloud environments. The solution provides outstanding performance, reliability and management for SMBs, enterprises and MSPs.
  • 9
    Edgenexus Load Balancer (ADC/WAF/GSLB) Reviews
    We offer the most user-friendly technology without sacrificing performance or features. We back it up with exceptional support and care delivered under a fair, cost-effective pricing model Our technology is used by small startups with big ideas, small budgets, and global enterprises. We love them all! Easy to use Load balancing, WAF, GSLB and SSO/Pre-Authentication. It is also the only true ADP Application Delivery Platform that allows for the enhancement of functionality and longevity using the app store or apps you create in-house.
  • 10
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 11
    MinerEye DataTracker Reviews

    MinerEye DataTracker

    MinerEye

    $2000/1TB/month
    MinerEye's DataTracker helps organizations overcome the information governance/protection challenge. It automatically scans, indexes and analyzes all unstructured and dark data in an organization's data repository. The solution uses proprietary Interpretive AI™, computer vision, and machine learning to locate relevant files from the billions of stored data. It automatically sends out alerts with the next best action recommendations in case of conflicts, duplicates, or potential violations. This allows data protection to be greatly enhanced and operational costs reduced.
  • 12
    VaultCore Reviews

    VaultCore

    Fornetix

    $1,118 per year
    VaultCore™ is a next-generation, highly scalable enterprise key management solution from Fornetix®. It integrates seamlessly with existing platforms, automates policy, and empowers administrators with a centralized, organized control that can be easily applied across all environments. Request a demo to experience VaultCore's products: - Quick, seamless integration with existing technology - Separation Of Duties (a best practice). - Powerful automation allows for centralized control of policy - Increased security of data in motion, at rest, and in use - Significant reduction in the costs associated with data breaches -- lost businesses, recovery time, reputational damage - Simplified compliance, regulatory enforcement - Scalable to more than 100 million keys (more that enough to meet any industry or government's requirements) - Reporting capabilities to meet compliance requirements - Ease in Use
  • 13
    Leostream Reviews

    Leostream

    Leostream Corporation

    $7.50 per user per month
    You can connect to any resource, anywhere, anytime, from any device, securely and quickly. Modern web-based UIs are your central hub for remote resources. Management prefers Windows, developers prefer macOS, and designers prefer Windows. Multi-OS environments can be supported with ease by Linux. Leostream integrates seamlessly with Teradici Cloud Access Software, and PCoIP Remote Working Station Cards. This allows for high-quality graphics to be used in cloud or datacenter applications. Scale Computing and Leostream offer a complete VDI solution. They are simple to set-up, easy to maintain, and affordable for small businesses. Leostream allows you to manage user-to-resource connections and assigns resources in large-scale enterprise environments. Leostream makes it easy to create a VDI and DaaS solution that your clients will love. Leostream offers all the tools you need for building and deploying a VDI.
  • 14
    VyOS Reviews

    VyOS

    VyOS Networks

    $1000
    Open source software and a universal router are key to democratizing the way we access networks. VyOS' vision is to revolutionize how we access networks, so that everyone can build the solutions they have always wanted, without limitations, restrictions, or prohibitive prices. We believe that internet access is just as important to human development as food, water, air, and healthcare. VyOS was founded by engineers for engineers. It is an open-source software company that makes it possible to access networks without restrictions or prohibitive fees. Through our open-source software and virtual platforms, we do this as VyOS. Stateful firewalls, zone based firewall, all types source and destination NAT (one-to-one, one-to many, many to many). For auditing, creating customized images and contributing, everyone has access to the entire codebase and build toolchain.
  • 15
    SAP Data Intelligence Reviews
    Data intelligence can transform data chaos into data value. Disjointed data assets can be connected, discovered, enriched, and orchestrated to provide actionable business insights at an enterprise scale. SAP Data Intelligence provides a comprehensive data management solution. It is the data orchestration layer within SAP's Business Technology Platform. It transforms distributed data into vital data insights and delivers innovation at scale. Integrate across the IT landscape to provide intelligent, relevant and contextual insights for your users. Integrate and orchestrate large data volumes and streams at scale. Machine learning enables you to streamline, operationalize, manage, and govern innovation. Comprehensive metadata management rules optimize governance and reduce compliance risk. Disjointed data assets can be connected, discovered, enriched, and orchestrated to provide actionable business insights at enterprise level.
  • 16
    WatchTower Security Management App Reviews
    You can monitor your network using Check Point's WatchTower Security Management App and respond quickly to security threats from anywhere with your mobile phone. The intuitive WatchTower Security Management App allows you to monitor your network in real time, alerts you when it is at risk, and configure security policies for multiple gateways. You can view all devices connected to your network as well as any security threats. Real-time notification for malicious attacks and unauthorized device connections. Block malware-infected devices quickly and view details to assist with further investigation. You can customize notifications to your top security events. You can view all security events by category. Click the link to drill down for more information. You can configure security settings for multiple gateways. Securely manage advanced security policy settings via the web user interface.
  • 17
    Multi-Domain Security Management Reviews
    Multi-Domain Security Management provides more security and control by dividing security management into multiple virtual realms. Virtual domains can be created by businesses of any size based on business unit, geography, or security function. This will simplify management and strengthen security. Allows for the isolation of roles and granular administration of multi-tenant security management architectures. One security management configuration for VPN and Firewall, IPS, or other protections. All network security management domains can be viewed, accessed and controlled from one console. Multiple administrators can be created and centrally managed in multi-domain security management environments. Administrators can be granted permission to manage specific domains and other aspects of the multidomain system. Multiple administrators can work simultaneously on different security management domains.
  • 18
    SysTrack Reviews

    SysTrack

    Lakeside Software

    Lakeside Software is a leader when it comes to digital experience monitoring. Software that gives IT teams the visibility they need to create and support productive digital workplaces is what we develop. Our technology is used by customers to perform workplace analytics, IT asset optimization and remote work management. SysTrack is a digital experience monitoring product that collects and analyzes data about everything that could impact business productivity and end-user experience. For more information, visit www.lakesidesoftware.com.
  • 19
    Stratodesk NoTouch Reviews
    Stratodesk NoTouch, the #1 Thin Client OS and management software in the world, is available now. Stratodesk NoTouch is a combination of NoTouch OS, NoTouch Center and can transform any PC, Thin Client or Laptop into a centrally managed Thin Endpoint. NoTouch OS can be instantly deployed to thousands of devices, and managed from oStratodesk NoTouch. NoTouch OS is the best Thin Client OS and management solution. Stratodesk NoTouch is a combination of NoTouch OS, NoTouch Center and can be used to transform any PC, Thin Client or Laptop into a centrally managed Thin Endpoint. NoTouch OS can be instantly deployed to thousands of devices and managed from one browser. NoTouch OS is a minimal-sized OS that can be installed from your server onto your computer, laptop, thin client, or Raspberry Pi device. NoTouch Center is the best endpoint management software to manage your VDI endpoints.
  • 20
    Thunder TPS Reviews
    Thunder TPS is used by top service providers and online gaming businesses. It provides automated DDoS protection that is scalable and automated. It uses advanced machine learning to detect attacks and mitigate them. Multi-modal source-based defense identifies attackers without causing damage to users. 5-level adaptive mitigation policy, zero day Automated Protection (ZAP), actionable distributed-denial-of-service weapons intelligence at a scale 96M-entry white/black lists Flexible and robust Distributed Denial of Service protection (DDoS), with a wide variety of hardware and software deployment options to meet your specific needs. High-precision, automated DDoS mitigation solution can be delivered as hardware or virtual appliances in speeds ranging from 1 Gbps up to 500 Gbps. High-performance, Sflow-based, IPFIX-based DDoS detection for a complete reactive cyber attack defense system. This appliance can be used as a standalone appliance, or integrated with aGalaxy 5000.
  • 21
    Actian Zen Reviews
    Actian Zen is a low-maintenance, embedded database management system that is high-performance and designed for edge applications, IoT, mobile devices and IoT environments. It provides developers with flexibility when working with unstructured and structured data. Actian Zen's small footprint, scalability and high reliability make it ideal for resource-constrained settings where consistent performance and minimal administration overhead are essential. It supports real-time analytics and data processing with built-in security and a self tuning architecture without the need for constant maintenance or monitoring. Actian Zen is used by many industries, including healthcare, retail and manufacturing, in which edge computing and distributed data environments play a critical role for business operations.
  • 22
    GigaSECURE Reviews
    The GigaSECURE®, Security Delivery Platform, is a next-generation network packet brokers that focuses on threat prevention, detection and prediction. The right tools ensure that the right traffic is delivered at the right time every time. To keep up with the increasing network speed, enable network security tools. Gain insight into network traffic. Optimize and provide relevant data for tool usage. Lower tool sprawl and costs. Your overall security posture is improved by efficient prevention and rapid detection and containment. Threats are not in danger. GigaSECURE allows security teams to gain broad access to and control network data from any location. It can be customized to extract specific applications sessions, metadata, and decrypted data. This architecture allows security tools to operate inline and out-of-band at peak performance, without compromising network resilience or speed.
  • 23
    Junos Traffic Vision Reviews
    Junos Traffic Vision, a licensed traffic sampling app for MX Series 3D Universal Edge Routers, is available. It provides detailed information on network traffic flows, which is useful for many operations and planning activities. Junos Traffic Vision monitors packets while they are being processed by the router and captures information such as source and destination addresses, packet count information, and packet and byte count information. These details are gathered and exported in a standards-based format to allow Juniper and third-party tools to analyze and present them. This includes usage-based accounting, traffic profiling and traffic engineering. Junos Traffic Vision is a high-performance, scale implementation that can be used inline or on service cards. It can be used alongside lawful intercept filtering or port mirroring without affecting performance.
  • 24
    Check Point Infinity Reviews
    In an effort to provide better protection, organizations often implement multiple cyber security solutions. They often end up with a patchwork security system that is costly and leads to high TCO. Businesses can take preemptive measures against advanced fifth-generation attacks by adopting a consolidated security strategy with Check Point Infinity architecture. This allows them to achieve a 50% increase in operational efficiency, and a 20% reduction in security cost. This is the first consolidated security architecture that spans networks, cloud, mobile, and IoT. It provides the highest level of threat prevention against known and unknown cyber-threats. 64 threat prevention engines that block known and unknown threats powered by threat intelligence. Infinity-Vision, the unified management platform of Check Point Infinity is the first modern, consolidated cybersecurity architecture designed to protect today's most sophisticated attacks on networks, endpoints, and cloud.
  • 25
    Check Point IPS Reviews
    Intrusion Prevention Systems detect and prevent attempts to exploit vulnerabilities in vulnerable systems or applications. They protect you from the latest breaking threat. Our Next Generation Firewall automatically updates the Check Point IPS protections. Your organization is protected regardless of whether the vulnerability was discovered years ago or just a few seconds ago. Check Point IPS provides thousands of behavioral and signature preemptive protections. Our acceleration technologies allow you to safely enable IPS. Your staff will save valuable time with a low false positive rate. IPS can be enabled on any Check Point security gateway to reduce total cost of ownership. Enterprises can get cloud-level expansion and resilience on their premises with this on-demand hyperscale threat prevention service. Users can access corporate networks and resources remotely from anywhere they are.
  • 26
    Automai Robotic Process Automation Reviews
    Automai offers Robotic Process Automation (RPA), which automates and manages even the most complex front and back office tasks for any application. No scripting. You can record your scenario and then edit it or build on it using the simple commands provided in the interface. Automai is the only RPA platform that includes testing and monitoring components. This allows scenarios to be created once and used in multiple functions within the same company. You can automate repetitive tasks and processes with Automai Robotic Process Automation. Since 2000, we have been improving and using our robotic automation technology. We started to emulate human behavior for our automated testing solutions. It's the best. Robotic automation intelligently adapts to changing variables in human decision-making, learning what's important for your business and adapting so that you can concentrate on larger issues.
  • 27
    SAP Internet of Things Reviews
    Use IoT-enriched business insight to embed in and expand business processes for transformative results. The SAP Internet of Things solution can address industrial IoT use case. It is the IoT layer in SAP's Business Technology Platform and allows users to reimagine business models and business processes using embedded IoT data and services. The SAP Internet of Things solution (SAP IoT), has a reference architecture that provides business services and specific capabilities to address industrial IoT use case across manufacturing, supply chain logistics, products, service management, and other areas. Cloud service for building IoT apps and integrating to business applications. Big Data that is integrated and managed. IoT data enhanced with business context, rules and an event-driven integration framework. Analytical services that allow live integration to SAP Analytics Cloud.
  • 28
    SAP Data Services Reviews
    With exceptional functionality for data integration, quality and cleansing, maximize the value of all structured and unstructured data in your organization. SAP Data Services software increases the quality of enterprise data. It is part of SAP's Information Management Layer. It delivers timely, relevant, and trusted information to help drive better business outcomes. Transform your data into a reliable, always-available resource for business insights and use it to streamline operations and maximize efficiency. Get contextual insight and unlock the true potential of your data with a complete view of all your information. Access to any size data and any source. Standardizing and matching data can improve decision-making and operational efficiency. This will reduce duplicates, identify relationships and address quality issues proactively. Use intuitive tools to unify critical data whether it is on-premise, in the cloud or within Big Data.
  • 29
    PowerTerm InterConnect Reviews
    The PowerTerm InterConnect Series consists of several robust terminal emulator applications that support the host access requirements of small and large organizations. It allows enterprises to use a single host access solution. PowerTerm InterConnect products provide fast and reliable access data residing on a wide range of hosts such as IBM Mainframe zSeries and IBM AS/400 iSeries. Each product of the PowerTerm InterConnect line allows terminal emulation using a variety of communication modes. PowerTerm InterConnect provides a flexible feature set that maximizes users' time and offers a wide variety of options. Power Script Language allows users to automate tasks and increase productivity. PowerTerm InterConnect is small in footprint and can be installed on any computer. It can run legacy applications quickly and efficiently.
  • 30
    PowerTerm Pro Reviews
    The PowerTerm Pro Series from Ericom Software is Ericom Software’s top terminal emulation solution. It simplifies and extends legacy accessibility functionality. PowerTerm Pro supports a variety of hosts and emulation types. This allows corporations to standardize on one host access solution. PowerTerm Pro Enterprise and PowerTerm Pro Pro Enterprise have a customizable GUI, SSL and SSH, and secure file transfer (SFTP) options. This allows corporations to choose the PowerTerm Pro product that best suits their security, server, and productivity needs. The intuitive GUI (graphic user interface), is easy to use and allows users to work quickly and efficiently. It also features drag-and-drop tools that allow for quick data access and AS/400 DFT which allows for file transfer between AS/400 hosts and PCs. PowerTerm Pro terminal emulator software is installed on a central Server and can be accessed via a Windows Desktop with per-user licensing.
  • 31
    SOLIDserver DDI Reviews
    The SOLIDserver™, DDI suite is designed for highly scalable, secure, and robust virtual and physical appliances for critical DNS-DHCP/IPAM services. It offers vital benefits to your network infrastructure's agility, reliability, security, and security. SOLIDserver is the foundation of DNS, DHCP, and IP Address Management projects (DDI) for datacenter automation and internet DNS, LAN infrastructures and cloud computing. It also helps IT organizations deal with the challenges of a dynamic, secure infrastructure. Software defined networking (SDN), which DDI enables, is fully integrated to the entire IT ecosystem. This includes orchestration of application deployment and IT Service Management (ITSM). EfficientIP DDI appliances support your business imperatives by strengthening your core network foundations to support business continuity and lower operating costs through smart automation.
  • 32
    Storware Reviews
    Unparalleled data resilience for virtual machines, containers and cloud environments, storage providers and endpoints, as well as Microsoft 365. One system, one universal licence, many uses You can choose efficiency, transparency, and cost savings. With our single universal license, you have true freedom of choice. You can get rid of vendor lock-in by using a stable, agentless suite that provides backup and snapshot management solutions for both commercial and open source hypervisors. Modern workloads require faster backup performance. You can save your time, money, and resources by using an agentless, crash-consistent backup for deployments that are stored on persistent volumes and run in Kubernetes environments. Data recovery is guaranteed in the event that there is a disaster, such as ransomware attacks, device damage or data deletion. Innovative backup solutions for Windows-based laptops and desktops will help you protect your business data. Complete backup and recovery solution for OneDrive for Business (Spreadsheet Online, Exchange Online), SharePoint Online, and other services.
  • 33
    NetBeez Reviews
    Legacy network monitoring tools only report device status and don't detect end-user performance problems. NetBeez monitors your network from the user's perspective, so you can maximize performance and availability. The NetBeez dashboard allows you to view historical and current network performance information from remote locations, users and public clouds. To reduce troubleshooting time, you can rely on active and distributed network monitoring agents. NetBeez appliances, software endpoints, and Wi-Fi monitoring devices monitor end-user experiences on WAN/SDWAN, Wi-Fi and public clouds. NetBeez provides network engineers the data and intelligence they need to manage complex network infrastructures. Hardware and software monitoring agents are dedicated to testing on-prem networks and remote networks from the user's perspective. They also report KPIs for service quality. Endpoints for Windows and Mac OS users of WFH
  • 34
    Netwrix Password Policy Enforcer Reviews
    Password policy enforcer by Netwrix will frustrate hackers, satisfy auditors, and delight users. Weak and leaked passwords are a major problem in IT networks. They make it easy for hackers to gain access to sensitive data, damage computers, and release ransomware. Unfortunately, native Windows tools are often unable to deliver the detailed configurations, rules, and policies required for modern password policy, leaving IT teams struggling with the evolving threat landscape and evolving requirements. Users are frustrated and IT helpdesks overloaded as they struggle to understand the requirements for new passwords. Learn how Netwrix Password Policy Enforcer helps you achieve effective password enforcement with no hassle.
  • 35
    Login VSI Reviews
    Login VSI helps organizations proactively manage the performance, capacity and cost of their virtual desktops and applications - traditional, hybrid, or in the cloud. Login Enterprise platform is 100% agentless and can be used in all major VDI and DaaS environments, including Citrix Virtual Apps and Desktops, VMware Horizon, and Microsoft Azure Virtual Desktop (AVD). With 360° proactive visibility, IT teams can plan and maintain successful digital workplaces with less cost and fewer disruptions.  
  • 36
    Nutanix Cloud Infrastructure Reviews
    Standardize on powerful, secure hyperconverged infrastructure for all applications and data to be delivered at any scale and on any cloud. Cloud technologies can help you to run your business more efficiently and effectively. Accelerate and predict your most demanding applications. Data locality maximizes hardware advances such as NVMe and RDM. Advanced distributed consistency algorithms protect data and keep it available, from bit rot to hardware failures and site failures. Storage can be tailored to your exact needs and expanded easily and quickly as they grow. Storage policies are applied logically based on workloads, rather than being tied to hardware.
  • 37
    HyTrust Reviews
    Organizations face the daunting task of addressing inconsistencies and gaps in policy enforcement in a multi-cloud environment. HyTrust CloudControl offers advanced privileged user access control, policy enforcement and forensic compliance for private clouds. HyTrust DataControl offers powerful data-at rest encryption and integrated key management to protect workloads in any cloud environment. Enterprises can protect their data by encrypting workloads. Scaling the management of encryption keys is one of the biggest challenges in workload encryption. HyTrust's mission aims to make cloud infrastructure private, public, and hybrid more trustable for government agencies, service providers, and enterprises. HyTrust offers solutions that automate security controls to software-defined computing, networking, and storage workloads.
  • 38
    Converged Cloud Fabric Reviews
    Converged Cloud Fabric is an automated fabric that uses cloud networking design principles. CCF uses VPC/VNet constructions on-prem in order to provide a cloud Network as-a-Service operational model. CCF automates the networking of multiple private cloud platforms. This allows the network to run at the speed and efficiency of Containers and VMs. CCF offers real-time visibility across the fabric, as well as telemetry and built-in analytics. It also provides one-click troubleshooting workflows and telemetry. CCF allows NetOps, DevOps, and CloudOps teams to collaborate effectively and quickly on-board tenants and applications. CCF allows mainstream and mid-sized organizations to use network as a strategic pillar in their digital transformation strategy. CCF's self service networking and contextual intelligence allow NetOps to focus on innovation, such as new services or analytics, and not on tedious manual tasks.
  • 39
    Sangfor Endpoint Secure Reviews
    Identify the threat's nature and respond quickly and flexible. Sangfor Endpoint Secure offers a different approach to protecting systems from malware and other types of threats than current next-generation Anti-virus solutions (NGAF) and endpoint detection & reaction (EDR). Endpoint Secure is part a fully integrated cooperative security solution that includes Sangfor's NGAF and IAM. This provides a holistic response to malware attacks and APT breaches throughout the entire organization's network. It also allows for easy management, operation and maintenance. The solution can be scaled to meet any organization's needs, whether they need on-premise or cloud management, as well as a hybrid solution. Endpoint secure integrates directly with the Sangfor NGAF. Improved real-time response to malware attacks. Quick identification and mitigation of malicious east-west (lateral propagation), and north-south(command & control). Comprehensive asset identification.
  • 40
    Lenovo ThinkAgile HX Series Reviews
    The Lenovo ThinkAgile HX is designed for easy deployment and management. It combines Nutanix software and Lenovo's #1 reliable, highly performing platforms. The ThinkAgile certified node HX1021 is a purpose-built Edge solution that provides right-sized compute, storage, and a 1U height, half width, and short depth form factor to meet customer needs at remote locations. The solution's condensed design allows for new computing possibilities right where data is generated, such as in retail, manufacturing units and gas stations, restaurants or healthcare. The ThinkAgile HX portfolio has been enhanced with second-generation Intel processors to provide even greater performance. It is optimized for a wide range of virtualized workloads including Remote Office Branch Office, file, print and email applications, analytics, and in-memory database databases. For six consecutive years, Lenovo platforms have held the #1 spot in reliability and hold the highest number performance world records.
  • 41
    Dell EMC XC Family Reviews
    XC Family solutions include XC Series appliances, XC Core Nodes, integrated Nutanix Software, and Dell EMC PowerEdge Servers with Intel Xeon processors. This makes XC Family one of the most flexible and scalable HCI platforms in the industry. XC Family systems are easy to deploy for all virtualized workloads thanks to the factory-installed Nutanix and a variety of hypervisors. This reduces management complexity and lowers total cost of ownership. Dell EMC has more than 12 years of experience integrating hardware with software for appliances built using PowerEdge servers. This includes 3 generations of XC Family appliances. This experience allows us to create technologies that simplify and streamline common workflows throughout the product's lifetime. Factory installation of the software stack. Software modules that can be deployed quickly and seamlessly. Tools specifically designed for HCI to simplify workflow orchestration within a cluster.
  • 42
    Netvisor ONE Reviews

    Netvisor ONE

    Pluribus Networks

    The move to Open Networking bare-metal switches offers significant operational and financial advantages to build next-generation networks. These switches offer the ability to achieve cloud-scale agility, elasticity, adaptability, and cloud-scale. The right Network Operating System (OS), is crucial for success when you move to disaggregated open networking strategies. Why? Why? Netvisor®, ONE is an open-source, secure, and programable next generation Network OS. It was purpose-built to maximize the power and performance Open Networking hardware. Netvisor ONE is proven to be reliable and flexible in deployments of mission-critical enterprise networks and carrier networks.
  • 43
    Stromasys Reviews
    Let us help you virtualize legacy systems in your business. Our experts can help you maintain legacy servers without taking on any risks. With aging hardware. Contact. Use the form below to contact a specialist about Charon. Solutions
  • 44
    BlueCat Unified DDI Reviews
    Your business requires a network capable of supporting strategic initiatives such as multicloud management, SASE SD-WAN, remote working, and more. You need core services that are optimized for collaboration across all teams who touch the network, including NetOps and security, cloud, application developers, etc. We provide DDI services that help your teams manage and secure your network, and build it faster.
  • 45
    DobiMigrate Reviews
    DobiMigrate®, is trusted to deliver in the most demanding environments. It has been proven to meet any company’s ROI and data integrity goals for migration to new storage and the cloud. Easy setup and management with an intuitive interface. Rely on years' experience and thousands of completed projects. You can be sure of 100% accurate data migration with verifiable proof. Flexible licensing allows you to migrate as little or as many data points as you need. Supports all major storage platforms, thousands of configurations, and eliminates vendor lock-in. You can achieve the promised ROI with minimal disruption from the new storage or cloud. Datadobi, the world's leader in unstructured data management software allows enterprises to maximize the value of their growing data universe. Datadobi assists customers in migrating and protecting data, while gaining insights and putting them into action for their business.
  • 46
    FaPipe IPVPN Reviews
    FatPipe IPVPN balances load between multiple managed and CPE based VPNs and dedicated private networks. FatPipe IPVPN provides an easy, low-cost migration route from private lines, frames, or point-to–point networks. You can combine multiple private, MPLS, or public networks without the need for additional equipment at the provider. FatPipe IPVPN allows you to use a CPE VPN or managed VPN service as a backup for your private line or frame relay. IPVPN can also be used to backup managed services with other providers as part of your disaster recovery or business continuity plan. FatPipe IPVPN, the only product of its type, works with multiple managed VPN service providers, CPE VPNs, private lines, and other providers to provide the highest level reliability, redundancy and speed for interoffice data transmissions.
  • Previous
  • You're on page 1
  • Next