What Integrates with VMware ESXi?
Find out what VMware ESXi integrations exist in 2026. Learn what software and services currently integrate with VMware ESXi, and sort them by reviews, cost, features, and more. Below is a list of products that VMware ESXi currently integrates with:
-
1
New Relic
New Relic
Free 2,911 RatingsAround 25 million engineers work across dozens of distinct functions. Engineers are using New Relic as every company is becoming a software company to gather real-time insight and trending data on the performance of their software. This allows them to be more resilient and provide exceptional customer experiences. New Relic is the only platform that offers an all-in one solution. New Relic offers customers a secure cloud for all metrics and events, powerful full-stack analytics tools, and simple, transparent pricing based on usage. New Relic also has curated the largest open source ecosystem in the industry, making it simple for engineers to get started using observability. -
2
Domotz
Domotz
281 RatingsDiscover why MSPs, IT Professionals, and System Integrators trust our Network Monitoring and Management Solution to monitor thousands of networks worldwide. Try for free now! -
3
Securden Unified PAM
Securden
Per User Pricing 12 RatingsSecurden Unified PAM is a comprehensive solution designed for privileged access security, enabling users to identify, store, categorize, share, manage, and monitor all privileged accounts, passwords, keys, documents, and various identities. This tool establishes a centralized system for managing passwords, automates procedures through approval workflows, governs access permissions, tracks and logs all interactions with essential IT resources, and promotes adherence to password security protocols. The primary components of Securden Unified PAM include modules for password management, privileged account oversight, secure remote access, application governance, endpoint privilege regulation, management of privileged sessions, and SSH key administration. Additionally, the platform is aligned with numerous compliance standards such as NIS2, DORA, NIST, PCI-DSS, HIPAA, and ISO-IEC 27001, ensuring rigorous security measures. Installation is generally rapid, often completed in mere minutes, and organizations can expect to have a fully operational privileged access management system set up in under a month using Securden Unified PAM. Furthermore, this efficiency allows businesses to quickly enhance their security posture while minimizing disruptions to their ongoing operations. -
4
Our ADC solution is designed to take your online services to new levels of performance, security, and reliability. It ensures seamless traffic distribution and resource utilization as well as enhanced protection against cyber threats. Our ADC solution provides you with massive scalability and high availability for your services, apps, and networks. Multi-core compatibility, unlimited throughput, connections and farms, and optimized to support multi-core. Installation is not required, allowing for a rapid consolidation of production and a seamless deployment. Integrate easily into your infrastructure for a cost-saving and productive setup. Shared hardware resources can reduce costs associated with physical equipment, making this a budget-friendly solution. Ready for 64-bit platforms to provide better performance, and a robust environment. It allows for more performance resources than other architectures.
-
5
Inuvika OVD Enterprise is a desktop virtualization solution that gives users secure access to their apps and virtual desktops from anywhere. Inuvika embraces the zero-trust principle, ensuring secure access and leaving no data on user devices. OVD Enterprise reduces complexity for admin and lowers the total cost of ownership by up to 60% when compared to Citrix or VMware/Omnissa Horizon. It can be deployed on-premise or through any private of public cloud platform provider. It is also available as a DaaS service through our network of Managed Services Providers. OVD is easy to install and manage. It integrates with leading enterprise standards, including any directory service, storage and hypervisors such as Proxmox VE, vSphere, Nutanix AHV and Hyper-V. Key Features: Use any device, including macOS, Windows, Linux, iOS/Android, Chromebook, Raspberry Pi, or any HTML5 Web browser. Multi-tenancy support Integrated Two-Factor Authentication Integrated Gateway enables secure remote access without a VPN Single Web-based Admin console Deploys on Linux so most Microsoft Windows server and SQL server licenses are not required. Hypervisor agnostic - ProxmoxVE, Hyper-V, vSphere, KVM, Nutaxix AVH and more.
-
6
With more than 50,000 customer installations across the five continents, Pandora FMS is a truly all-in-one monitoring solution, covering all traditional silos for specific monitoring: servers, networks, applications, logs, synthetic/transactional, remote control, inventory, etc. Pandora FMS allows you to quickly find and solve problems. It scales them so that they can be derived either from on-premise, multi-cloud, or both. You now have the ability to use your entire IT stack and analytics to solve any problem, even those that are difficult to find. You can control and manage any technology and application with more than 500 plugins, including SAP, Oracle, Lotus or Citrix, Jboss, VMware, AWS and SQL Server.
-
7
Safeguard your essential business information with reliable and straightforward data protection and recovery through automatic cloud backup. Carbonite Safe™ is a tailored data backup solution specifically designed for organizations like yours, ensuring that installation and usage are user-friendly, so you won't need any specialized IT training to keep your data secure and accessible. It enables you to protect files across servers, external storage devices, and up to 25 computers, while also offering straightforward recovery options for computers that have fallen victim to ransomware—without the need to pay a ransom. You can oversee your online backups and retrieve files from any device through a secure, web-based dashboard, helping you fulfill data retention requirements efficiently. This business cloud backup is adaptable to your specific needs; whether you're restoring an individual file or an entire directory system, it can be accomplished in just a few clicks. Advanced encryption safeguards your data during transmission and storage, ensuring it never remains in an unsecured state. Unlike many other companies that impose additional fees for support, Carbonite Safe provides assistance from our award-winning team of experts at no extra cost, ensuring you have the help you need whenever you require it. This comprehensive approach to data protection not only enhances peace of mind but also allows your business to operate smoothly, knowing that your critical information is well-protected.
-
8
Network engineers save time with the BackBox Automation Platform for Network Teams by quickly automating and auditing time consuming manual tasks. With a library of over 3,000 pre-built automations and a script-free way to build new ones BackBox makes it easy to get started on your automation journey. BackBox is a point-and-click automation solution for firewall and network device backups, OS updates and patching, configuration compliance audits and remediation, network vulnerability management, network configuration change management, and more.
-
9
CacheGuard
CacheGuard Technologies
$0 2 RatingsCacheGuard product line is based on a core product called CacheGuard-OS. Once installed on a bare metal or virtual machine, CacheGuard-OS transforms that machine into a powerful network appliance . The resulted appliance can then be implemented as different types of Gateways to Secure & Optimize your network. See below a brief description of all CacheGuard appliances. - Web Gateway: gain control over the Web traffic in your organization & filter unwanted Web traffic in your organization. - UTM (Unified Threat Management) : secure your networks against all kind of threats coming from the internet with a Firewall, an Antivirus at the Gateway, a VPN server and a Filtering proxy. - WAF (Web Application Firewall): block malicious requests on your critical Web applications and protect your business. The WAF integrates OWASP rules with the possibility to design your own custom rules. In addition, an IP reputation based filtering allows you to block IPs listed in real time blacklists. - WAN Optimizer : prioritize your critical network traffic, save your precious bandwidth and get High Availability for your internet access through multiple ISP. -
10
KACE is an endpoint management solution that offers a single point of control for managing IT systems across the entire organization. From initial deployment to ongoing maintenance, KACE is designed to fulfill all endpoint security and deployment needs—helping businesses quickly deploy, monitor, and manage their devices using a unified inventory database. KACE improves device security with on-demand hardware and software discovery, patch management, compliance reporting, and real-time monitoring of mobile endpoints. KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more. Unified Endpoint Management by KACE. Where Next Meets Now.
-
11
Checkmk is an IT monitoring system that allows system administrators, IT managers and DevOps teams, to quickly identify and resolve issues across their entire IT infrastructure (servers and applications, networks, storage and databases, containers, etc. Checkmk is used daily by more than 2,000 commercial customers worldwide and many other open-source users. Key product features * Service state monitoring with nearly 2,000 checks 'outside the box' * Event-based and log-based monitoring * Metrics, dynamic Graphing, and Long-Term Storage * Comprehensive reporting incl. Accessibility and SLAs * Flexible notifications and automated alert handling * Monitoring business processes and complex systems * Software and hardware inventory * Graphical, rule-based configuration and automated service discovery These are the top use cases * Server Monitoring * Network Monitoring * Application Monitoring * Database Monitoring * Storage Monitoring * Cloud Monitoring * Container Monitoring
-
12
Netreo is the best full-stack IT infrastructure management and observation platform. Netreo is a single source for truth for proactive performance monitoring and availability monitoring of large enterprise networks, infrastructure, and applications. Our solution is used by: IT executives should have full visibility of the business service, right down to the infrastructure and network that supports them. IT Engineering departments are used as a decision support system to plan and architect modern solutions. IT Operations teams can have real-time visibility into what is going wrong in their environment, which bottlenecks exist, and who it is affecting. All of these insights are available for systems and vendor mix in large heterogeneous environments that are constantly changing. We have a growing list of vendors that we support (over 350 integrations), including network vendors, storage, virtualization, and servers.
-
13
Stackscale
Stackscale
€199 per month 1 RatingStackscale's Private Cloud is a hybrid of the traditional environment, which is robust and secure, with Public Cloud services that are functional, flexible, and scalable. Our private cloud environments are a combination of our large network, our state-of the-art data centers in Europe, and our 24/7 technical support team. They offer exceptional performance, availability, and security. Two full racks of networking gear and servers can be combined into two nodes using network storage. This reduces power consumption by up to 95%. It is easy to design a private cloud environment that can be run at Stackscale. There are far fewer variables to consider. Important design parameters include RAM and persistent storage. These parameters are not as important as IOPS, bandwidth, and CPU requirements, which are kept from becoming a bottleneck in most situations. Our bare-metal server are fully configurable and offer the same level of control as in-house solutions. - 14
-
15
PACE Suite
Infopulse
€1825.00/year/ user App packaging tool for optimizing the app packaging process from creating to deploying packages, minimizing software delivery time. -
16
NovaBACKUP for Servers
NovaBACKUP Corporation
$399.95 /year Protect your business from data loss with fast, affordable Windows Server backup software with full disaster recovery protection plus local and offsite cloud backup storage with support for SQL, Exchange, and virtual machines. Instantly recover your entire system in just minutes and reduce your exposure to critical downtime. Backups utilize up to AES 256-bit encryption. NovaBACKUP Server Agent comes with 250 GB of Cloud Storage, Free Upgrades, Support, and Setup Assistance, so you can be sure that the software is configured in the best possible way for your environment. -
17
Parallels RAS
Parallels
$120 US/year/ concurrent user Parallels® RAS meets you where you are in your virtualization journey—bridging on-premises and multi-cloud solutions into a centralized management console for administrators and a secure virtual work environment for end users. Enjoy an all-in-one digital workspace and remote work solution that provides secure virtual access to business applications and desktops on any device or OS—from anywhere. Agile, cloud-ready foundation and end-to-end security fueled by a centralized management console with granular policies is at your fingertips. Take advantage of on-premises, hybrid, or public cloud deployments and integrate with existing technology like Microsoft Azure and AWS. Gain the flexibility, scalability, and IT agility you need to quickly adapt to changing business needs. Best of all, Parallels RAS offers a single, full-featured licensing model that includes 24/7 support and access to free training. -
18
SpamCheetah
Gayatri Hitech
$1/month/ user SpamCheetah can be used to stop spam, malware, and viruses at the mail server level. It is very cost-effective and affordable. It acts as an SMTP proxy, stopping all types of phishing and business email compromise at SMTP. It uses a combination network-level techniques such as greylisting and greytrapping, blacklisting URL scanning, malware API tests, and more. It includes standard email gateway features such as sender and recipient based block, attachment size blocking and MIME type filtering, pattern based blocking, quarantine reports, and mail metadata reports. You can try it for 30 days. We also offer two editions: one for a single mail server and one to support multiple mail servers. We offer ISO download, VMWare Appliance and raw VM Download options. -
19
Edgenexus Load Balancer (ADC/WAF/GSLB)
Edgenexus
$50We offer the most user-friendly technology without sacrificing performance or features. We back it up with exceptional support and care delivered under a fair, cost-effective pricing model Our technology is used by small startups with big ideas, small budgets, and global enterprises. We love them all! Easy to use Load balancing, WAF, GSLB and SSO/Pre-Authentication. It is also the only true ADP Application Delivery Platform that allows for the enhancement of functionality and longevity using the app store or apps you create in-house. -
20
Axonius
Axonius
Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. -
21
Bacula Enterprise
Bacula Systems
Bacula Enterprise offers a single platform that provides cloud backup and recovery software for the Modern Data Center. Bacula Enterprise backup & recovery software is ideal for medium and large businesses. It offers unique innovation, modern architecture and business value benefits, as well as low cost of ownership. Bacula Enterprise corporate backup software solution uses unique technologies that increase the interoperability of Bacula Enterprise into many IT environments, such as managed service providers, software vendors, cloud providers, enterprise data centers, and cloud providers. Bacula Enterprise is used by thousands of organizations around the world in mission-critical environments such as NASA, Texas A&M University and Unicredit. Bacula offers more security features than other vendors and advanced hybrid Cloud connectivity to Amazon S3, Google, Oracle, and many others. -
22
MinerEye DataTracker
MinerEye
$2000/1TB/ month MinerEye's DataTracker helps organizations overcome the information governance/protection challenge. It automatically scans, indexes and analyzes all unstructured and dark data in an organization's data repository. The solution uses proprietary Interpretive AI™, computer vision, and machine learning to locate relevant files from the billions of stored data. It automatically sends out alerts with the next best action recommendations in case of conflicts, duplicates, or potential violations. This allows data protection to be greatly enhanced and operational costs reduced. -
23
Cruz Operations Center (CruzOC)
Dorado Software
$1350CruzOC is a multi-vendor, scalable network management and IT operations tool that provides robust but easy-to-use netops. CruzOC's integrated, automated management features include performance monitoring, configuration management, lifecycle management, and lifecycle management of 1000s of vendors. Administrators can use CruzOC to automate their data center operations and critical resources. This will improve network and service quality, speed up network deployments and lower operating expenses. The result is comprehensive and automated problem resolution from a single-pane-of-glass. Cruz Monitoring & Management. Monitoring & Analytics, NMS -- health, NPM traffic, log, and change. Automation & configuration management -- compliance and security -- orchestration, provisioning. Automated deployment -- auto-deploy, ZTP, remote deploy. Deployments are available both on-premises and in the cloud. -
24
NovaBACKUP Managed Backup
NovaBACKUP Corporation
NovaBACKUP Managed Backup is a secure, flexible, scalable centrally managed SaaS backup solution with cloud and local storage that you can offer your customers as a service. Supports Windows systems, Microsoft SQL, Exchange, and virtual machines. NovaBACKUP Managed Backup is account-based. This means that MSPs don't need to keep track of license keys. You can deploy quickly and manage all your clients from one interface. In addition, providers receive initial setup assistance and ongoing support from experts who understand each provider's environment. -
25
StorMagic SvSAN
StorMagic
StorMagic SvSAN is simple storage virtualization that eliminates downtime. It provides high availability with two nodes per cluster, and is used by thousands of organizations to keep mission-critical applications and data online and available 24 hours a day, 365 days a year. SvSAN is a lightweight solution that has been designed specifically for small-to-medium-sized businesses and edge computing environments such as retail stores, manufacturing plants and even oil rigs at sea. SvSAN is a simple, 'set and forget' solution that ensures high availability as a virtual SAN (VSAN) with a witness VM that can be local, in the cloud, or as-a-service, supporting up to 1,000 2-node SvSAN clusters. IT professionals can deploy and manage 1,000 sites as easily as 1, with Edge Control centralized management. It delivers uptime with synchronous mirroring and no single point of failure, even with poor, unreliable networks, and it allows non-disruptive hardware and software upgrades. Plus, SvSAN gives organizations choice and control by allowing configurations of any x86 server models and storage types, even mixed within a cluster, while vSphere or Hyper-V hypervisors can be used. -
26
SimplyVideo
SimplyVideo
$32.78 per monthSimplyVideo harnesses the capabilities of Extended Reality (XR) and spatial computing to enhance video conferencing experiences. Our platform empowers teams to collaborate seamlessly from any location worldwide, enabling them to tackle challenges more swiftly and effectively than ever. Field workers can perform audits, inspections, and maintenance with immediate support from remote specialists, significantly reducing costly downtime and contributing to environmental sustainability. With SimplyVideo, you can integrate drones into your video calls, providing an aerial perspective of your on-ground team. This innovative drone functionality elevates your virtual meetings, allowing for the elimination of unnecessary travel and lowering downtime while also enhancing health and safety measures. By leveraging real-time video collaboration, you can offer critical insights to your workers while keeping their hands free, significantly boosting operational efficiency and accelerating task completion. Moreover, this dynamic approach fosters stronger connections among colleagues, making collaboration more intuitive and effective. -
27
AOMEI Cyber Backup
AOMEI
$99.00/yearly Easily manage backups for all devices from a single console, ensuring seamless protection for VMware and Hyper-V virtual machines. With just one click, you can back up Microsoft SQL Server databases, and the solution supports all major virtual machine types, including VMware, vSphere, Microsoft Azure, and Amazon Web Services (AWS). Proven through thousands of tests in various environments, the backup success rate reaches up to 99%. It offers flexible cloud-free space allocation for backups, allowing you to allocate just the right amount of storage. The system can automatically back up your system, disks, and other data on a schedule, with quick and easy restoration of entire VMs, files, and objects. This data protection solution is ideal for environments running Hyper-V 2012 R2, 2016, and 2019, offering automatic, regular backups for Hyper-V virtual machines on a daily, weekly, or monthly basis, or triggered by specific events, including USB plug-ins. Hot backup ensures that Hyper-V VMs are protected in real-time, guaranteeing a 100% backup and restore with zero downtime. Incremental and differential backup options help save storage by only backing up modified files or folders on Hyper-V environments. -
28
LuGo-Test
LuGo-Test
$35 per monthFor your recruitment needs, we offer assessments that are not only efficient and precise but also equitable. By utilizing coding challenges, you can evaluate how applicants write, compile, and execute code effectively. Additionally, you can review their compilation history to gain insights into their thought processes. Our extensive repository features over 300 technologies, allowing you to design a test by selecting the most relevant questions tailored to your specific job requirements. Companies can personalize their testing experience with themed tests that reflect their website design and product branding. To maintain integrity, our application identifies if candidates are accessing ChatGPT's website, disqualifying them if they do so after an initial warning. Throughout the testing process, the application captures screenshots to ensure that applicants are not sourcing answers from the internet. We leverage AI technology to assess potential risks, ensuring that your applicant is the sole individual taking the test. Furthermore, we employ facial recognition to confirm a human presence, and a profile image report will be generated upon test submission for added verification. In this way, we prioritize both security and accuracy in the assessment process. -
29
Netwrix Auditor
Netwrix
Netwrix Auditor, a visibility platform, allows you to control changes, configurations, and access in hybrid IT environments. It also eliminates the stress associated with your next compliance audit. All changes in your cloud and on-prem systems can be monitored, including AD, Windows Servers, file storage, Exchange, VMware, and other databases. Reduce the complexity of your inventory and reporting. You can easily verify that your access and identity configurations match the known good state by reviewing them regularly. -
30
Clarive
Clarive Software
€2 per user per monthEmbark on your DevOps journey and streamline application delivery with a cohesive and robust workflow. The path to continuous delivery begins here. Clarive stands out as the pioneering tool that offers an integrated experience for both Development and Operations teams. Establish and plan your milestones, quality checkpoints, and releases in alignment with your product vision and objectives. Package your source code or any related artifacts into changesets that facilitate various review, testing, or deployment workflows. Track your release journey through various stages and environments, while fostering collaboration and iterative improvements using kanban boards and discussions. Automate your release pipelines to set up infrastructure, manage dependencies, and deploy components seamlessly. This solution is perfect for Development teams eager to adopt lean delivery practices and optimize their workflows. It also serves Operations teams aiming to unify all delivery processes, break down silos, and effectively manage application dependencies. By consolidating tools, you can save both time and resources, paving the way for a more efficient and productive DevOps environment. Embrace this opportunity to enhance your collaborative efforts and achieve your goals with greater efficiency. -
31
Keyfactor EJBCA
Keyfactor
EJBCA, an Enterprise-grade PKI platform, can issue and manage digital certificates in the millions. It is one of the most widely used PKI platforms worldwide and is used by large enterprises in all sectors. -
32
BeBackup
BeBackup
BeBackup is a tailored solution specifically designed for IT service providers, offering a completely French SaaS backup service that operates independently of any hosting provider. By simply backing up client computers and servers to your own infrastructure, you can enhance your profitability while ensuring customer loyalty. Transition to the Cloud with assurance, efficiency, and simplicity as BeBackup delivers pioneering IT backup solutions and comprehensive support crucial for your operations. Our software caters to IT professionals and corporate IT departments seeking a blend of effectiveness and cost-efficiency. Your clients will appreciate knowing precisely where and how their data is preserved and protected, fostering their trust in your ability to handle their essential assets. Acknowledging that computer data is one of your most precious resources, our backup software ensures the highest level of security. You have the flexibility to determine your hosting preferences and the architecture for deployment should you choose to self-host. In conclusion, computer backup is not just an option for seasoned coding experts; it is a necessity for every business looking to safeguard its digital assets. -
33
euBackups
euBackups
$26.75 per monthCloud-hosted, GDPR compliant backups for businesses. Backups of your employees, critical data, and systems are simplified. German servers provide a secure and robust infrastructure. Get your free trial for 30 days. -
34
Liongard
Liongard
$29Standardize, secure and scale your IT managed service. Liongard is the only automation platform that gives complete visibility across the stack. This allows you to unleash your team and operate at 10x speed. Logging in manually to manage Internet Domains, SQL servers and all other systems is a tedious task. Unify systems in Liongard for auditing historical data, monitoring critical changes, setting proactive alerts, and reporting across the IT stack. With Liongard's unified platform for automation, you can quickly onboard customers and monitor system changes every day. Liongard's unified platform for automation makes it easier to onboard customers and track system changes daily. Liongard's unified automation platform allows you to access data for business reviews, scoping new project opportunities, and converting customers into Managed Services. Your MSP can be more profitable, efficient, and secure. This includes everything from how you evaluate potential customers to how they protect their systems. Liongard automates the process, minimizing human errors. -
35
Acronis Cyber Protect Cloud
Acronis
Minimize downtime and safeguard your clients' data while reducing expenses. Acronis Cyber Protect Cloud stands out as the sole solution that seamlessly combines cybersecurity, data protection, and management, ensuring the safety of endpoints, systems, and data. This integrated approach simplifies processes, enabling service providers to offer superior protection to their customers at a more affordable price. With cutting-edge cybersecurity measures in place, it features an advanced AI-driven behavioral detection engine designed to thwart zero-day attacks. Additionally, it guarantees dependable backup and recovery options, offering both full-image and file-level backups, as well as disaster recovery solutions and metadata collection for security forensics. The platform is tailored for managed service providers (MSPs), incorporating protection management features such as URL filtering, vulnerability assessments, and patch management to enhance control. In contrast, the conventional array of endpoint protection products suffers from a lack of integration, resulting in greater time demands for management, including tasks like maintaining licenses, installing updates and patches, verifying compatibility following updates, and juggling multiple policies across various user interfaces. By choosing Acronis, service providers can streamline their operations and improve their overall service quality. -
36
Implementing fine-grained rollback and recovery for Active Directory is essential, as both unintentional and malicious alterations pose considerable security and performance challenges. Given that Active Directory (AD) serves as the main authentication and authorization framework for most IT infrastructures, ensuring its integrity and availability is critical. Restoring or rolling back changes—whether due to human mistakes or malicious actions—using the built-in capabilities of AD can often be quite challenging and, in certain situations, entirely unfeasible. Although the AD Recycle Bin feature allows for the recovery of deleted objects when activated, Microsoft lacks a straightforward method for reverting changes to directory objects to a prior state. To address this gap, Netwrix Recovery for Active Directory provides organizations with a streamlined solution for efficiently rolling back and recovering unintended changes to the directory. Users can easily navigate through various snapshots and utilize a granular full-text search feature, which simplifies the process of recovering only the necessary information, thereby enhancing overall operational efficiency. This capability not only mitigates risks associated with AD alterations but also reinforces the organization's security posture by ensuring quick recovery from potential threats.
-
37
MAAS
Canonical
$30Self-service, remote deployment of operating systems such as Windows, CentOS, ESXi, and Ubuntu on physical servers transforms your data center into a bare metal cloud environment. This Metal-As-A-Service (MAAS) solution enables provisioning for a variety of systems, offering on-demand server capabilities alongside remote edge cluster management. With comprehensive infrastructure monitoring and discovery features, it seamlessly integrates with tools like Ansible, Chef, Puppet, SALT, and Juju, ensuring rapid installations from scratch. Supporting VMware ESXi, Windows, CentOS, RHEL, and Ubuntu, it allows for the creation of customized images with pre-installed applications, as well as configurations for disk and network settings. The platform utilizes an API-driven approach for essential services such as DHCP, DNS, PXE, and IPAM, while a REST API facilitates streamlined provisioning processes. Furthermore, it incorporates LDAP user authentication and role-based access control (RBAC) to enhance security measures. Hardware testing and commissioning are integral parts of the solution, which is designed to deliver the quickest operating system installation times in the industry, thanks to its highly optimized image-based installer. MAAS is compatible with all certified servers from leading vendors and efficiently discovers servers located in racks, chassis, and broader data center networks, while also supporting major system BMCs and chassis controllers. The combination of these features allows organizations to manage their infrastructure more effectively and drive operational efficiency. -
38
HPE SimpliVity 380
Hewlett Packard Enterprise
$68 per monthThe HPE SimpliVity 380 provides IT organizations with the flexibility and cost-effectiveness associated with cloud solutions while maintaining the governance and control of on-premises systems. It serves as a robust hyperconverged solution tailored to enhance the efficiency and resilience of modern data centers. This innovative solution streamlines IT operations by integrating infrastructure and sophisticated data services for virtualized environments into a single platform. Built on HPE ProLiant DL380 servers, the HPE SimpliVity 380 is a compact and scalable 2U rack-mounted unit that unifies server, storage, and storage networking functionalities. By offering a comprehensive suite of advanced features, SimpliVity solutions significantly boost the operational efficiency, management, protection, and performance of all virtualized workloads, doing so with far less expense and complexity than traditional infrastructure setups. Moreover, organizations can leverage this technology to adapt quickly to changing business needs, thereby enhancing their overall competitive edge in the marketplace. -
39
Leostream
Leostream Corporation
$7.50 per user per monthYou can connect to any resource, anywhere, anytime, from any device, securely and quickly. Modern web-based UIs are your central hub for remote resources. Management prefers Windows, developers prefer macOS, and designers prefer Windows. Multi-OS environments can be supported with ease by Linux. Leostream integrates seamlessly with Teradici Cloud Access Software, and PCoIP Remote Working Station Cards. This allows for high-quality graphics to be used in cloud or datacenter applications. Scale Computing and Leostream offer a complete VDI solution. They are simple to set-up, easy to maintain, and affordable for small businesses. Leostream allows you to manage user-to-resource connections and assigns resources in large-scale enterprise environments. Leostream makes it easy to create a VDI and DaaS solution that your clients will love. Leostream offers all the tools you need for building and deploying a VDI. -
40
Alliance Key Manager
Townsend Security
$4,800 one-time paymentOnce your data has been encrypted, the security of your personal information relies heavily on advanced key management practices employed at the enterprise level. This solution offers robust, high-availability, and standards-based key management for encryption across a diverse array of applications and databases. Alliance Key Manager serves as a FIPS 140-2 compliant enterprise key management system, assisting organizations in fulfilling compliance mandates while safeguarding sensitive data. The symmetric key management solution is capable of generating, overseeing, and distributing AES encryption keys in 128-bit, 192-bit, and 256-bit formats, suitable for any application or database operating on various enterprise platforms. Moreover, the access to encryption keys can be controlled through multiple criteria. The highest level of access requires a secure and authenticated TLS connection to the key server. Additionally, encryption keys can be tailored to specific users, groups, or designated individuals within those groups, allowing for precise control over who can access the data. Furthermore, organizations have the flexibility to establish enterprise-wide groups, enabling the restriction of keys to designated enterprise users, groups, or particular individuals within those groups, thereby enhancing the overall security and management of sensitive information. -
41
BudgetVM
BudgetVM
$29 per monthDedicated servers offer unparalleled performance, reliability, and security for private or web-based applications, all meticulously customized to meet your specific needs. They are particularly well-suited for applications that demand exceptional IO performance, substantial memory, or extensive processing power. With the advantages of dedicated servers available at a more affordable price, you can effectively scale your resources as necessary. These servers are perfect for dynamic applications that require a cost-efficient, scalable, and highly available solution with dedicated resources. While they provide all the advantages of cloud servers, dedicated servers also feature bespoke hardware and infrastructure tailored to your business, enhancing overall performance. Additionally, they ensure guaranteed resource availability, making them the best option for flexibility, accessibility, and security at a low cost. For those seeking a more budget-friendly alternative, VPS servers represent our most economical choice for web-based or private applications, leveraging the same technology as our cloud solutions but with reduced resources and expenses. This makes them an attractive option for startups or smaller projects looking to maintain quality while keeping costs down. -
42
StellarProtect
TXOne Networks
StellarProtect™ represents a revolutionary advancement in endpoint security specifically designed for modern operational technology assets. As the first of its kind, this all-terrain protection solution excels in advanced threat detection, effectively neutralizing known attacks while its state-of-the-art machine learning capabilities defend against previously unidentified threats—functioning without the need for internet connectivity. By leveraging an inventory of applications and certificates, StellarProtect’s ICS filtering minimizes unnecessary overhead, ensuring optimal lightweight operation. Furthermore, it operates efficiently across diverse environmental conditions, maintaining high accuracy with minimal impact on endpoint performance, thus enabling comprehensive protection in a single deployment. The intelligent framework of StellarProtect not only offers guard against both known and unknown malware through machine learning but also utilizes an ICS root of trust, which pre-emptively verifies over a thousand ICS software certificates and licenses, significantly lowering the burden of protection overhead while enhancing overall security integrity. -
43
OpenText Core MDR
OpenText
OpenText Core MDR (Managed Detection and Response) gives organizations access to 24/7 cybersecurity expertise without the burden of hiring and retaining an in-house team. The platform continuously monitors networks, endpoints, and systems to detect suspicious activity and reduce the likelihood of a breach. By leveraging advanced analytics, threat intelligence, and human-led investigation, MDR ensures that threats are identified early and remediated quickly. IT teams maintain full visibility into alerts and incidents while relying on OpenText’s SOC analysts for deeper insights and coordinated response. The solution integrates easily with existing security tools, reducing operational complexity and consolidating threat data into a single view. Its expert-driven threat hunting helps uncover hidden risks that automated solutions alone may miss. Organizations gain stronger defenses, faster response times, and better alignment with compliance expectations. Ultimately, OpenText Core MDR helps businesses stay resilient in an evolving threat landscape. -
44
OSSEC
OSSEC
OSSEC is completely open source and available at no cost, allowing users to customize its functionalities through a wide range of configuration settings, including the addition of personalized alert rules and the creation of scripts to respond to incidents as they arise. Atomic OSSEC enhances this capability by assisting organizations in fulfilling specific compliance standards like NIST and PCI DSS. It effectively identifies and notifies users of unauthorized alterations to the file system and any malicious activities that could jeopardize compliance. The Atomic OSSEC detection and response system, built on open-source principles, enriches OSSEC with thousands of advanced rules, real-time file integrity monitoring (FIM), regular updates, software integrations, built-in active response features, a user-friendly graphical interface (GUI), compliance resources, and dedicated professional support. This makes it a highly adaptable security solution that combines extended detection and response (XDR) with compliance capabilities in one comprehensive package. Its flexibility and thoroughness make it an invaluable tool for organizations aiming to bolster their security posture while maintaining compliance. -
45
OverSOC
OverSOC
Enhance your attack surface management by establishing a centralized source of truth. Unify and gather all your IT and Cybersecurity data to swiftly identify gaps in your inventory, prioritize remediation efforts, and expedite the auditing process. Integrate data from the various tools employed by your IT and SecOps teams through APIs, as well as information from business teams utilizing flat files, consolidating everything into a single, agent-free database. Streamline the processes of data ingestion, standardization, and consolidation within a unified framework. Say goodbye to duplicate assets and the tedious tasks of manually entering data into spreadsheets and dashboards. Boost your data enrichment capabilities by incorporating external resources, such as security bulletins from recognized authorities. Leverage the filtering system to query your cybersecurity data, allowing you to obtain precise insights regarding the health of your information systems. You can utilize OverSOC's pre-configured filters tailored to specific customer requirements or create personalized filters, which can be saved and shared with your team members. This comprehensive approach not only simplifies data management but also improves collaboration across departments. -
46
Open-E JovianDSS
Open-E
Open-E JovianDSS, a ZFS and Linux-based software for data storage, is designed to fit enterprise-level Software Defined Storage (SDS). It is a comprehensive solution for data backup, business continuity and disaster recovery. Open-E JovianDSS is a powerful solution that ensures data integrity, security, and reliability. Its flexible and hardware-agnostic design supports cost-effective storage solutions that allow organizations to optimize their resources while protecting vital data. Backup and disaster recovery features such as High Availability, Off-site Data protection, and Read-only snapshots are built-in to protect business operations and minimize disruptions. Open-E JovianDSS is a flexible platform that adapts to changing IT requirements and provides a secure, scalable and efficient platform for managing enterprise information. -
47
Switch Automation
Switch Automation
Switch Automation is a global real estate software company that helps property owners and facility managers reduce operating costs, improve energy efficiency and deliver exceptional occupant satisfaction. Our comprehensive smart building platform integrates with traditional building systems as well as Internet of Things (IoT) technologies to analyze, automate and control assets in real-time. We serve enterprise customers and partners in a variety of industries including financial services, retail, grocery, commercial real estate and more. -
48
EmpowerID
EmpowerID
$2 per user per monthEmpowerID is a distinguished, comprehensive suite for identity management and cloud security, created by The Dot Net Factory, LLC, also known as "EmpowerID". This innovative solution is adept at overseeing millions of identities, both internal and external, across various cloud and on-premise environments for organizations worldwide, offering the most extensive array of IAM functionalities available. Its robust, out-of-the-box offerings encompass features such as single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and a specialized identity platform designed for application developers. Each of these solutions utilizes a sophisticated authorization engine based on roles and attributes, capable of managing complex organizational structures and supporting multi-tenant SaaS providers. EmpowerID's architecture is highly scalable and fully customizable, ensuring that enterprises can achieve efficient and effective IAM results tailored to their specific needs. Ultimately, EmpowerID stands out as an essential tool for organizations looking to streamline identity management while enhancing security protocols. -
49
Commvault Cloud
Commvault
Commvault Cloud serves as an all-encompassing cyber resilience solution aimed at safeguarding, managing, and restoring data across various IT settings, which include on-premises systems, cloud infrastructures, and SaaS platforms. Utilizing the power of Metallic AI, it boasts cutting-edge functionalities such as AI-enhanced threat detection, automated compliance mechanisms, and accelerated recovery options like Cleanroom Recovery and Cloudburst Recovery. The platform guarantees ongoing data protection through proactive risk assessments, threat identification, and cyber deception tactics, all while enabling smooth recovery and business continuity through infrastructure-as-code automation. By providing a streamlined management interface, Commvault Cloud allows organizations to protect their vital data assets, ensure regulatory compliance, and quickly address cyber threats, which ultimately helps in reducing downtime and minimizing operational interruptions. Additionally, the platform's robust features make it an essential tool for businesses aiming to enhance their overall data security posture in an ever-evolving digital landscape. -
50
Visual KPI
Transpara
Monitoring and visualization of real-time operations, including KPIs and dashboards. Also includes trends, analytics, hierarchy, alerts, and analytics. All data sources (industrial and IoT, business, and external) are gathered. It displays data in real-time on any device, without the need to move it.