What Integrates with VMware vSphere?

Find out what VMware vSphere integrations exist in 2025. Learn what software and services currently integrate with VMware vSphere, and sort them by reviews, cost, features, and more. Below is a list of products that VMware vSphere currently integrates with:

  • 1
    Stonebranch Reviews
    See Software
    Learn More
    Stonebranch’s Universal Automation Center (UAC) is a Hybrid IT automation platform, offering real-time management of tasks and processes within hybrid IT settings, encompassing both on-premises and cloud environments. As a versatile software platform, UAC streamlines and coordinates your IT and business operations, while ensuring the secure administration of file transfers and centralizing IT job scheduling and automation solutions. Powered by event-driven automation technology, UAC empowers you to achieve instantaneous automation throughout your entire hybrid IT landscape. Enjoy real-time hybrid IT automation for diverse environments, including cloud, mainframe, distributed, and hybrid setups. Experience the convenience of Managed File Transfers (MFT) automation, effortlessly managing and orchestrating file transfers between mainframes and systems, seamlessly connecting with AWS or Azure cloud services.
  • 2
    Inuvika OVD Enterprise Reviews
    Top Pick

    Inuvika

    $8.55/concurrent user/month
    10 Ratings
    Inuvika OVD Enterprise is a desktop virtualization solution that gives users secure access to their apps and virtual desktops from anywhere. Inuvika embraces the zero-trust principle, ensuring secure access and leaving no data on user devices. OVD Enterprise reduces complexity for admin and lowers the total cost of ownership by up to 60% when compared to Citrix or VMware/Omnissa Horizon. It can be deployed on-premise or through any private of public cloud platform provider. It is also available as a DaaS service through our network of Managed Services Providers. OVD is easy to install and manage. It integrates with leading enterprise standards, including any directory service, storage and hypervisors such as Proxmox VE, vSphere, Nutanix AHV and Hyper-V. Key Features: Use any device, including macOS, Windows, Linux, iOS/Android, Chromebook, Raspberry Pi, or any HTML5 Web browser. Multi-tenancy support Integrated Two-Factor Authentication Integrated Gateway enables secure remote access without a VPN Single Web-based Admin console Deploys on Linux so most Microsoft Windows server and SQL server licenses are not required. Hypervisor agnostic - ProxmoxVE, Hyper-V, vSphere, KVM, Nutaxix AVH and more.
  • 3
    Vinchin Backup & Recovery Reviews
    Top Pick
    Vinchin Backup & recovery, a comprehensive, next-generation backup solution developed by Vinchin itself, supports the most popular virtual environments in the world, including VMware, Hyper-V and XenServer. It also supports databases such as Oracle DB and MySQL, SQL Server and PostgreSQL. It also supports cloud archive, offsite copies, ransomware protection, and other data security features. It prevents loss of important business data due human error, viruses, attacks on hardware, natural disasters and wars.
  • 4
    Carbonite Reviews
    Safeguard your essential business information with reliable and straightforward data protection and recovery through automatic cloud backup. Carbonite Safe™ is a tailored data backup solution specifically designed for organizations like yours, ensuring that installation and usage are user-friendly, so you won't need any specialized IT training to keep your data secure and accessible. It enables you to protect files across servers, external storage devices, and up to 25 computers, while also offering straightforward recovery options for computers that have fallen victim to ransomware—without the need to pay a ransom. You can oversee your online backups and retrieve files from any device through a secure, web-based dashboard, helping you fulfill data retention requirements efficiently. This business cloud backup is adaptable to your specific needs; whether you're restoring an individual file or an entire directory system, it can be accomplished in just a few clicks. Advanced encryption safeguards your data during transmission and storage, ensuring it never remains in an unsecured state. Unlike many other companies that impose additional fees for support, Carbonite Safe provides assistance from our award-winning team of experts at no extra cost, ensuring you have the help you need whenever you require it. This comprehensive approach to data protection not only enhances peace of mind but also allows your business to operate smoothly, knowing that your critical information is well-protected.
  • 5
    Faddom Reviews
    Faddom provides real-time application dependency mapping without requiring credentials, agents, or system access. It delivers full visibility into hybrid IT environments, showing how servers, applications, and network flows interact. With zero disruption, Faddom helps IT teams plan migrations, document infrastructure, improve incident response, and strengthen cybersecurity. Maps are created within an hour and continuously updated, giving teams confidence and control. Whether for audits, change planning, or modernization efforts, Faddom offers fast, secure insights that reduce risk and improve decision-making.
  • 6
    SaltStack Reviews
    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure--on-prem, in the cloud, or at the edge. It is built on an event-driven automation engine that detects and responds intelligently to any system. This makes it a powerful solution for managing complex environments. SaltStack's new SecOps offering can detect security flaws and mis-configured systems. This powerful automation can detect and fix any issue quickly, allowing you and your team to keep your infrastructure secure, compliant, and up to date. Comply and Protect are both part of the SecOps suite. Comply scans for compliance with CIS, DISA, STIG, NIST and PCI standards. Also, scan your operating system for vulnerabilities and update it with patches and patches.
  • 7
    iTop Reviews
    Whether you’re an infrastructure manager handling complex systems, a service support leader striving for customer satisfaction, or a decision-maker focused on ROI and compliance, iTop adapts to your processes to simplify your tasks, streamline operations, and enhance service quality. Gain a real-time, 360° view of all your IT assets and incidents in one place, reducing downtime and improving the efficiency of your support team. Effortlessly manage multi-client environments and streamline collaboration across departments. With iTop, you get a solution that scales with your growth, providing tools to tackle your most pressing IT challenges while maintaining service continuity and improving team productivity
  • 8
    Zmanda Reviews
    Zmanda is a proven, reliable, high-performance enterprise backup and recovery solution. Zmanda provides a comprehensive solution at 50% less than the competition. You also get 24*7 support with a 2x higher NPS than the industry average. Since 2005, Zmanda has been trusted by enterprises, governments, and educational institutions worldwide. Zmanda enables you to back up to cloud, NAS, and disk. Zmanda supports advanced features, such as ransomware protection with air gap, client-side deduplication, forever incremental backups, and zero trust. It can be deployed as a container, VM, or Zmanda-hosted instance.
  • 9
    Netreo Reviews

    Netreo

    Netreo

    $5/resource/mo
    1 Rating
    Netreo is the best full-stack IT infrastructure management and observation platform. Netreo is a single source for truth for proactive performance monitoring and availability monitoring of large enterprise networks, infrastructure, and applications. Our solution is used by: IT executives should have full visibility of the business service, right down to the infrastructure and network that supports them. IT Engineering departments are used as a decision support system to plan and architect modern solutions. IT Operations teams can have real-time visibility into what is going wrong in their environment, which bottlenecks exist, and who it is affecting. All of these insights are available for systems and vendor mix in large heterogeneous environments that are constantly changing. We have a growing list of vendors that we support (over 350 integrations), including network vendors, storage, virtualization, and servers.
  • 10
    SoftNAS Reviews
    SoftNAS is a cloud-native and software-defined enterprise cloud NAS filer product line. It can be used for primary data storage, secondary data storage, and hybrid cloud data integration. It allows existing applications to securely connect to the cloud without reengineering. SoftNAS offers enterprise-class NAS features such as high-availability and deduplication, compression and thin-provisioning. It also supports LDAP integration and Active Directory integration. SoftNAS protects mission critical data, primary, hot data, backup/archive, and makes cloud data migration more efficient and reliable. SoftNAS offers the most comprehensive storage options in terms price vs performance and backend storage choice, available on-demand at petabyte-scale across the AWS Marketplaces and Azure Marketplaces as well as on-premises on VMware.
  • 11
    Goliath Performance Monitor Reviews
    The Goliath Performance Monitor, equipped with advanced intelligence and automation, empowers IT professionals to predict, address, and document issues related to end-user experiences, no matter the location of IT workloads or users. It zeroes in on the three primary factors that typically trigger support tickets: initiating a logon, the logon procedure itself, and performance during sessions. This innovative technology aims to provide proactive alerts for potential end-user experience challenges before they arise, and if they do occur, it equips you with the necessary data for swift troubleshooting. Furthermore, it generates objective evidence through reports and historical metrics, ensuring there is tangible proof to substantiate corrective measures aimed at averting future complications. The Goliath Performance Monitor offers extensive and detailed visibility, enabling effective troubleshooting of VDI environments with the most thorough performance data at your disposal. Consequently, support teams and administrators can swiftly pinpoint the exact location of issues within the delivery infrastructure, thereby enhancing overall operational efficiency. This comprehensive approach not only resolves current challenges but also helps in fine-tuning systems for future stability.
  • 12
    NAKIVO Backup & Replication Reviews

    NAKIVO Backup & Replication

    NAKIVO

    $229/ socket; $25 workload/y
    NAKIVO Backup & Replication provides a top-rated, fast, and affordable backup, ransomware recovery, and disaster recovery solution that works in virtual, physical and cloud environments. The solution provides outstanding performance, reliability and management for SMBs, enterprises and MSPs.
  • 13
    Azure NetApp Files Reviews
    Azure NetApp Files (ANF) is a high-performance file storage solution designed specifically for core business applications within the Microsoft Azure ecosystem. This service simplifies the migration and operation of complex, performance-demanding, and latency-sensitive applications for enterprise line-of-business and storage experts without requiring any code modifications. ANF is frequently utilized as the foundational shared file storage in various scenarios, including the seamless migration of POSIX-compliant Linux and Windows applications, as well as critical systems like SAP HANA, databases, high-performance computing infrastructures, and enterprise web applications. With support for multiple protocols, it facilitates the effortless transfer of both Linux and Windows applications to Azure. Different performance tiers are available to ensure workloads align closely with their specific performance needs. Furthermore, deep integration with Azure guarantees a smooth and secure user experience, eliminating any learning or management challenges. Additionally, ANF holds leading certifications such as SAP HANA, GDPR, and HIPAA, ensuring that even the most demanding workloads can be safely migrated to Azure without concern. Overall, Azure NetApp Files stands out as a robust solution for enterprises looking to optimize their cloud storage capabilities.
  • 14
    Flexiscale Reviews

    Flexiscale

    Flexiscale

    £0.01
    Flexiscale's hosted desk service is a flexible and secure solution for businesses that support remote workers and office workers. You can continue to use Windows desktop in the office and remote work with Flexiscale's hosted desk. All your data and applications are protected and backed-up. Flexiscale's hosted Desktop remains the same whether you access it from your office on a PC, Mac, tablet, or smartphone. Access your desktop securely via any web browser. You can work from anywhere and have the assurance that your business is always backed up. You can forget about the hassle and overhead associated with managing your desktop infrastructure. Instantly create new user desktops and deploy them on-demand.
  • 15
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 16
    JupiterOne Reviews

    JupiterOne

    JupiterOne

    $2000 per month
    Go beyond asset management. Turn complexity into capability. Our cyber asset analysis platform empowers security teams by providing total visibility into the assets, context and risks that make up their attack surface. With JupiterOne, organizations transform asset visibility from frustration into strength.
  • 17
    Cruz Operations Center (CruzOC) Reviews
    CruzOC is a multi-vendor, scalable network management and IT operations tool that provides robust but easy-to-use netops. CruzOC's integrated, automated management features include performance monitoring, configuration management, lifecycle management, and lifecycle management of 1000s of vendors. Administrators can use CruzOC to automate their data center operations and critical resources. This will improve network and service quality, speed up network deployments and lower operating expenses. The result is comprehensive and automated problem resolution from a single-pane-of-glass. Cruz Monitoring & Management. Monitoring & Analytics, NMS -- health, NPM traffic, log, and change. Automation & configuration management -- compliance and security -- orchestration, provisioning. Automated deployment -- auto-deploy, ZTP, remote deploy. Deployments are available both on-premises and in the cloud.
  • 18
    NetApp Cloud Insights Reviews
    Manage the efficiency and performance of your cloud operations seamlessly. With NetApp Cloud, you gain comprehensive insight into your applications and infrastructure. Utilizing Cloud Insights, you can effectively monitor, troubleshoot, and enhance all resources across your entire tech stack, whether hosted on-premises or in the cloud. Safeguard your most crucial asset—data—from ransomware attacks by leveraging early detection systems and automated threat responses. You can also receive alerts about potential misuse or theft of vital intellectual property by malicious actors, both from within and outside your organization. Maintain corporate compliance through audits of access and usage patterns related to your essential data, whether it resides on-premises or in the cloud. Achieve full-stack visibility over your infrastructure and applications from a multitude of collectors, providing a centralized overview. You won’t have to rush to discover new monitoring solutions each time a novel platform is integrated into your organization, allowing you to focus on innovation and growth instead. This streamlined approach ensures that you can respond promptly to any challenges that may arise.
  • 19
    StorMagic SvSAN Reviews
    StorMagic SvSAN is simple storage virtualization that eliminates downtime. It provides high availability with two nodes per cluster, and is used by thousands of organizations to keep mission-critical applications and data online and available 24 hours a day, 365 days a year. SvSAN is a lightweight solution that has been designed specifically for small-to-medium-sized businesses and edge computing environments such as retail stores, manufacturing plants and even oil rigs at sea. SvSAN is a simple, 'set and forget' solution that ensures high availability as a virtual SAN (VSAN) with a witness VM that can be local, in the cloud, or as-a-service, supporting up to 1,000 2-node SvSAN clusters. IT professionals can deploy and manage 1,000 sites as easily as 1, with Edge Control centralized management. It delivers uptime with synchronous mirroring and no single point of failure, even with poor, unreliable networks, and it allows non-disruptive hardware and software upgrades. Plus, SvSAN gives organizations choice and control by allowing configurations of any x86 server models and storage types, even mixed within a cluster, while vSphere or Hyper-V hypervisors can be used.
  • 20
    Elastic Observability Reviews
    Leverage the most extensively utilized observability platform, founded on the reliable Elastic Stack (commonly referred to as the ELK Stack), to integrate disparate data sources, providing cohesive visibility and actionable insights. To truly monitor and extract insights from your distributed systems, it is essential to consolidate all your observability data within a single framework. Eliminate data silos by merging application, infrastructure, and user information into a holistic solution that facilitates comprehensive observability and alerting. By integrating limitless telemetry data collection with search-driven problem-solving capabilities, you can achieve superior operational and business outcomes. Unify your data silos by assimilating all telemetry data, including metrics, logs, and traces, from any source into a platform that is open, extensible, and scalable. Enhance the speed of problem resolution through automatic anomaly detection that leverages machine learning and sophisticated data analytics, ensuring you stay ahead in today's fast-paced environment. This integrated approach not only streamlines processes but also empowers teams to make informed decisions swiftly.
  • 21
    AOMEI Cyber Backup Reviews
    Easily manage backups for all devices from a single console, ensuring seamless protection for VMware and Hyper-V virtual machines. With just one click, you can back up Microsoft SQL Server databases, and the solution supports all major virtual machine types, including VMware, vSphere, Microsoft Azure, and Amazon Web Services (AWS). Proven through thousands of tests in various environments, the backup success rate reaches up to 99%. It offers flexible cloud-free space allocation for backups, allowing you to allocate just the right amount of storage. The system can automatically back up your system, disks, and other data on a schedule, with quick and easy restoration of entire VMs, files, and objects. This data protection solution is ideal for environments running Hyper-V 2012 R2, 2016, and 2019, offering automatic, regular backups for Hyper-V virtual machines on a daily, weekly, or monthly basis, or triggered by specific events, including USB plug-ins. Hot backup ensures that Hyper-V VMs are protected in real-time, guaranteeing a 100% backup and restore with zero downtime. Incremental and differential backup options help save storage by only backing up modified files or folders on Hyper-V environments.
  • 22
    SwiftCache Reviews

    SwiftCache

    SwiftCache

    $550/server/month
    SwiftCache is an all-in-one CDN platform that helps businesses enhance their website’s speed and performance. Offering features like automatic infrastructure deployment, proactive monitoring, and detailed reporting, SwiftCache ensures optimal performance across regions and devices. It also includes easy-to-manage SSL certificates, transparent billing, and flexible scalability to meet diverse business needs. With real-time insights into resource usage and application health, SwiftCache allows businesses to make informed adjustments and prevent downtime, all while keeping infrastructure costs under control.
  • 23
    Netwrix Auditor Reviews
    Netwrix Auditor, a visibility platform, allows you to control changes, configurations, and access in hybrid IT environments. It also eliminates the stress associated with your next compliance audit. All changes in your cloud and on-prem systems can be monitored, including AD, Windows Servers, file storage, Exchange, VMware, and other databases. Reduce the complexity of your inventory and reporting. You can easily verify that your access and identity configurations match the known good state by reviewing them regularly.
  • 24
    Runecast  Reviews

    Runecast

    Runecast Solutions

    Runecast is an enterprise IT platform that saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. Your team can do more with less via a single platform that checks all your cloud infrastructure, for increased visibility, security, and time-saving. Security teams benefit from simplified vulnerability management and regulatory compliance, across multiple standards and technologies. Operations teams are able to reduce operational overheads and increase clarity, enabling you to be proactive and return to the valuable work you want to be doing.
  • 25
    Gloo Gateway Reviews
    Gloo Gateway is a robust API connectivity solution designed for cloud-native environments, enabling enterprises to manage both internal and external API traffic securely and efficiently. It integrates seamlessly with cloud providers and on-premises systems, supporting a wide array of API protocols. The platform offers features like advanced traffic management, federated control planes for multi-cluster environments, and a developer portal for streamlined API consumption. With its zero-trust security model, Gloo Gateway ensures secure API communication across all directions and provides actionable insights through real-time analytics, making it ideal for modern API-driven organizations.
  • 26
    IT Portal Reviews

    IT Portal

    IT Portal

    $25 per user per month
    Introducing the ultimate versatile solution for managing Knowledge Bases, Documents, Passwords, and Configurations, whether hosted on our cloud or yours! Clients enjoy seamless access to their documentation both online and offline. This platform is not only favored by Managed Service Providers (MSPs) but also relied upon by IT departments globally. Currently, over 2,500 paying users actively utilize the IT Portal, excluding numerous instances that permit unlimited users. Our cloud services span various regions, including the United States, Canada, the United Kingdom, the European Union, and Australia, while also providing the option to deploy in your own private cloud. As IT teams expand, they often find themselves overwhelmed by disorganized file shares and cumbersome Excel password lists. This solution offers a secure and structured environment that facilitates efficient information access and sharing related to IT infrastructure. The IT Portal effectively minimizes downtime, enhances accountability in documentation, and assures managers and IT professionals of a reliable system. With its robust features, the IT Portal is built to accommodate the evolving needs of growing IT teams, ensuring they stay ahead in an increasingly complex landscape.
  • 27
    beSOURCE Reviews

    beSOURCE

    Beyond Security (Fortra)

    Use potent code analysis to integrate security into SDLC. Software development must include security. It has not been historically. Static application security testing was used to be separated from Code quality reviews. This resulted in limited impact and value. beSOURCE focuses on the code security of applications and integrates SecOps with DevOps. Other SAST offerings view security as a separate function. Beyond Security has turned this model on its head by adopting the SecOps perspective when addressing security from every angle. Security Standards. beSOURCE adheres all relevant standards.
  • 28
    IBM Cloud for VMware Solutions Reviews
    IBM Cloud for VMware Solutions offers a streamlined approach for organizations to harness the vast advantages of cloud technology. By enabling the migration of VMware workloads to the IBM Cloud, businesses can leverage their existing tools, technologies, and expertise from their local environments. The incorporation of Red Hat OpenShift enhances integration and automation, promoting faster innovation through various services such as AI and analytics. This solution provides a secure and compliant automated deployment architecture that has been validated for financial institutions. With over 15 years of experience, IBM is among the largest operators of VMware workloads globally. The platform ensures optimal infrastructure and performance, featuring more than 100 bare metal configurations. It holds the highest data security certification in the industry, allowing users to maintain control with the “keep your own key” (KYOK) feature. Organizations can extend and migrate their virtual machines (VMs) to the cloud, facilitating data center consolidation, increasing capacity to meet resource demands, or modernizing outdated infrastructure with cutting-edge cloud innovations. This comprehensive solution not only enhances efficiency but also fosters a more agile IT environment.
  • 29
    Mirantis Kubernetes Engine Reviews
    Mirantis Kubernetes Engine (formerly Docker Enterprise) gives you the power to build, run, and scale cloud native applications—the way that works for you. Increase developer efficiency and release frequency while reducing cost. Deploy Kubernetes and Swarm clusters out of the box and manage them via API, CLI, or web interface. Kubernetes, Swarm, or both Different apps—and different teams—have different container orchestration needs. Use Kubernetes, Swarm, or both depending on your specific requirements. Simplified cluster management Get up and running right out of the box—then manage clusters easily and apply updates with zero downtime using a simple web UI, CLI, or API. Integrated role-based access control (RBAC) Fine-grained security access control across your platform ensures effective separation of duties, and helps drive a security strategy built on the principle of least privilege. Identity management Easily integrate with your existing identity management solution and enable two-factor authentication to provide peace of mind that only authorized users are accessing your platform. Mirantis Kubernetes Engine works with Mirantis Container Runtime and Mirantis Secure Registry to provide security compliance.
  • 30
    CyberArk Workforce Identity Reviews
    Enhance your team's productivity by providing straightforward and secure entry to essential business resources through CyberArk Workforce Identity. Users require rapid access to numerous business tools, while you must ensure that it is indeed them accessing the system, not an intruder. By utilizing CyberArk Workforce Identity, you can strengthen your workforce's capabilities while effectively safeguarding against threats. Clear obstacles for your employees so they can advance your organization to greater achievements. Authenticate identities with robust, AI-driven, risk-aware, and password-less methods. Simplify the management of application access requests, the creation of app accounts, and the revocation of access. Focus on keeping your employees engaged and productive rather than burdening them with constant logins. Make informed access decisions using AI-powered insights. Facilitate access from any device and location, precisely when it’s needed, to ensure seamless operations. This approach not only enhances security but also optimizes overall workflow efficiency for your organization.
  • 31
    Actian Zen Reviews
    Actian Zen is a compact, efficient database management system tailored for embedded use in edge applications, mobile technologies, and IoT settings. This system uniquely combines SQL and NoSQL data structures, offering developers the versatility needed to handle both structured and unstructured information. Renowned for its minimal resource requirements, scalability, and dependable performance, Actian Zen is particularly suited for environments that have limited resources and demand consistent output with low maintenance. It boasts integrated security measures and an architecture that automatically adjusts, allowing for real-time data processing and analytics while minimizing the need for continuous oversight. Its application spans various sectors, including healthcare, retail, and manufacturing, where the capacity for edge computing and managing distributed datasets is vital for operational success. As businesses increasingly rely on technology, the significance of Actian Zen in facilitating efficient data management will only grow.
  • 32
    NetApp Virtual Storage Console Reviews
    The NetApp Virtual Storage Console (VSC) for VMware vSphere functions as a plug-in for vCenter Server, seamlessly integrating with VMware environments to enable comprehensive lifecycle management of virtual machines that use NetApp storage systems. By providing a management interface within the vCenter console, VSC allows administrators to execute various tasks aimed at improving both server and storage efficiency. Notable features include the ability to provision and clone datastores, fine-tune ESXi host configurations in line with NetApp’s best practices, and monitor storage performance and health metrics. Furthermore, VSC encompasses the VASA Provider, which facilitates the management of VMware Virtual Volumes (vVols), and the Storage Replication Adapter (SRA) that connects with VMware Site Recovery Manager, thereby enhancing data protection and disaster recovery efforts. This comprehensive toolset empowers IT teams to streamline their workflows and optimize resource utilization across their virtualized environments.
  • 33
    Leostream Reviews

    Leostream

    Leostream Corporation

    $7.50 per user per month
    You can connect to any resource, anywhere, anytime, from any device, securely and quickly. Modern web-based UIs are your central hub for remote resources. Management prefers Windows, developers prefer macOS, and designers prefer Windows. Multi-OS environments can be supported with ease by Linux. Leostream integrates seamlessly with Teradici Cloud Access Software, and PCoIP Remote Working Station Cards. This allows for high-quality graphics to be used in cloud or datacenter applications. Scale Computing and Leostream offer a complete VDI solution. They are simple to set-up, easy to maintain, and affordable for small businesses. Leostream allows you to manage user-to-resource connections and assigns resources in large-scale enterprise environments. Leostream makes it easy to create a VDI and DaaS solution that your clients will love. Leostream offers all the tools you need for building and deploying a VDI.
  • 34
    StorMagic SvKMS Reviews
    We are convinced that organizations merit a comprehensive solution for managing their encryption keys. SvKMS offers a unified platform that facilitates the management of all encryption keys, regardless of location. Clients can access an enterprise-level key management system suitable for various encryption workflows, whether they operate at the edge, within a data center, in the cloud, or across multiple clouds. With its enterprise-grade functionalities, SvKMS presents a user-friendly interface at an unexpectedly affordable price. It can be deployed anywhere, ensuring high availability without limitations, and supports integration with any operational workflow. The advanced key management capabilities, coupled with robust reporting and authorization features, come at the most competitive price for extensive scaling. Centralized oversight, straightforward configuration, and seamless administration are at the core of the system. By consolidating all encryption key management activities into a unified virtual appliance, SvKMS enhances risk mitigation through a graphical user interface, incorporates REST API-driven workflows, and adheres to KMIP standards, enabling swift customization, comprehensive logging, and effective dashboard auditing and monitoring for various deployment scenarios. This holistic approach ensures that enterprises can efficiently manage their encryption needs while minimizing risks and maximizing operational efficiency.
  • 35
    Alliance Key Manager Reviews

    Alliance Key Manager

    Townsend Security

    $4,800 one-time payment
    Once your data has been encrypted, the security of your personal information relies heavily on advanced key management practices employed at the enterprise level. This solution offers robust, high-availability, and standards-based key management for encryption across a diverse array of applications and databases. Alliance Key Manager serves as a FIPS 140-2 compliant enterprise key management system, assisting organizations in fulfilling compliance mandates while safeguarding sensitive data. The symmetric key management solution is capable of generating, overseeing, and distributing AES encryption keys in 128-bit, 192-bit, and 256-bit formats, suitable for any application or database operating on various enterprise platforms. Moreover, the access to encryption keys can be controlled through multiple criteria. The highest level of access requires a secure and authenticated TLS connection to the key server. Additionally, encryption keys can be tailored to specific users, groups, or designated individuals within those groups, allowing for precise control over who can access the data. Furthermore, organizations have the flexibility to establish enterprise-wide groups, enabling the restriction of keys to designated enterprise users, groups, or particular individuals within those groups, thereby enhancing the overall security and management of sensitive information.
  • 36
    Shoreline Reviews
    Shoreline is the only cloud reliability platform that allows DevOps engineers to build automations in a matter of minutes and fix problems forever. Shoreline’s modern “Operations at the Edge” architecture runs efficient agents in the background of all monitored hosts. Agents run as a DaemonSet on Kubernetes or an installed package on VMs (apt, yum). The Shoreline backend is hosted by Shoreline in AWS, or deployed in your AWS virtual private cloud. Debugging and repairing issues is easy with advanced tooling for your best SREs, Jupyter style notebooks for the broader team, and a platform that makes building automations 30X faster by allowing operators to manage their entire fleet as if it were a single box. Shoreline does the heavy lifting, setting up monitors and building repair scripts, so that customers only need to configure them for their environment.
  • 37
    Omnissa Horizon Cloud Service Reviews
    Transform your virtual desktop and application delivery with an advanced hybrid desktop-as-a-service (DaaS) solution. The cutting-edge "thin edge" architecture significantly reduces the infrastructure footprint, leading to decreased operational expenses, improved stability, and less maintenance effort. Strengthen VDI scalability through a contemporary, cloud-native framework that adapts to your organization’s growth. Oversee desktop and application virtualization while dynamically adjusting capacity to align with business requirements. Horizon Control Plane Services streamline everyday tasks and furnish the necessary visibility to analyze and resolve issues within your environments. By utilizing a managed DaaS platform, you can elevate desktop virtualization, fostering agility, efficiency, and productivity throughout a geographically dispersed workforce while ensuring cost savings. Additionally, facilitate the delivery of virtual desktops and applications from the most suitable locations, all while maintaining centralized management through a unified interface, ensuring a seamless user experience.
  • 38
    OverSOC Reviews
    Enhance your attack surface management by establishing a centralized source of truth. Unify and gather all your IT and Cybersecurity data to swiftly identify gaps in your inventory, prioritize remediation efforts, and expedite the auditing process. Integrate data from the various tools employed by your IT and SecOps teams through APIs, as well as information from business teams utilizing flat files, consolidating everything into a single, agent-free database. Streamline the processes of data ingestion, standardization, and consolidation within a unified framework. Say goodbye to duplicate assets and the tedious tasks of manually entering data into spreadsheets and dashboards. Boost your data enrichment capabilities by incorporating external resources, such as security bulletins from recognized authorities. Leverage the filtering system to query your cybersecurity data, allowing you to obtain precise insights regarding the health of your information systems. You can utilize OverSOC's pre-configured filters tailored to specific customer requirements or create personalized filters, which can be saved and shared with your team members. This comprehensive approach not only simplifies data management but also improves collaboration across departments.
  • 39
    Runbook Studio Reviews

    Runbook Studio

    Kelverion

    $1,095 per month
    Kelverion's Runbook Studio is an intuitive design tool that allows both technical and non-technical users to leverage Azure Automation effectively. This platform includes a variety of integrations and ready-made solutions, ensuring that the creation, management, and support of automation runbooks is within reach for all members of an organization. With its drag-and-drop interface and code-free graphical authoring, users can develop runbooks by employing low-code or no-code techniques. This innovative method enables the conversion of manual tasks into automated workflows, eliminating the necessity for programming knowledge by using shapes, diagrams, and dropdown menus. Runbook Studio boasts over 800 integrations, which encompass multi-vendor, cloud, and on-premise connectivity, facilitating seamless API interactions among enterprise IT systems. Additionally, it provides comprehensive Runbook Solutions, specifically designed for frequent automation scenarios, which are fully configured and ready for large-scale deployment in production environments with complete logging capabilities. Overall, this empowers organizations to optimize their operations and drive efficiency through automation.
  • 40
    NetWatch.ai Reviews
    NetWatch.ai provides an all-encompassing, AI-powered monitoring and security platform aimed at unifying disparate tools into a cohesive solution tailored for contemporary IT settings. The platform features three main product categories: NetWatch OPS, which delivers real-time monitoring, proactive alerts, and efficient resource management for servers and networks; Secure OPS, a hybrid SIEM that facilitates comprehensive security oversight and compliance for both cloud-based and on-premises systems; and AI OPS, which harnesses machine learning to foresee potential issues, automate resolution processes, and enhance operational efficacy. A unique “AI System Administrator” functions as a virtual operator that oversees customer infrastructures, integrates seamlessly through API with existing workflows, and provides thorough visibility and automation. Additionally, for organizations in need of expert support, NetWatch.ai offers Hive OPS SOC, a tiered Security Operations Center service that includes round-the-clock monitoring, incident response, and various other critical services. This integrated approach not only simplifies management but also significantly strengthens the overall security posture of businesses in an increasingly complex digital landscape.
  • 41
    NetZoom DCIM Solutions Reviews
    NetZoom DCIM Solutions is a data center software company that helps professionals model, monitor, manage and access physical, virtual, and cloud IT infrastructure.
  • 42
    LiveVault Reviews
    LiveVault delivers comprehensive cloud backup and recovery solutions to more than 11,000 companies throughout North America. By striking a balance between user-friendliness and robust capabilities, along with adaptable options to cater to distinct business needs, LiveVault features exclusive enterprise-grade services such as: Offsite backup paired with local storage solutions, web-based access to safeguarded data, agentless backups for multiple LAN-connected systems, and redundant data centers to guarantee data recoverability. Each LiveVault client can feel confident knowing their data is secure and can be promptly restored to support their business continuity requirements. Recognizing that different types of data have varying levels of importance, LiveVault emphasizes that not all data should be handled uniformly. To gain further insight into how to leverage the LiveVault Data Prioritization Strategy, be sure to watch the accompanying video. Additionally, this approach empowers businesses to focus on their most critical information while ensuring comprehensive protection for all data assets.
  • 43
    RTView Reviews

    RTView

    SL Corporation

    $175.00/month
    View the health status of your applications as a comprehensive indicator of the entire application ecosystem, which includes everything from the physical infrastructure to the middleware and ultimately the user experience. Integrate health metrics across various technologies to gain a clearer picture. Implement proactive monitoring to identify stress points early on. Establish connections between performance metrics and application health status. Ensure that information is readily available to collaborate with other teams. Are you still relying on individual management consoles for each product to oversee your middleware platforms? This complexity is unnecessary. Access all of your middleware technologies through a singular, unified interface. Gather data efficiently without impacting performance. Relate performance metrics to hosts, networks, databases, and application servers. Begin with a small-scale approach and expand as your needs grow. Utilize our packaged solutions to monitor your applications and their underlying technologies in real-time, or create a tailored real-time monitoring system with our high-performance integrated development environment (IDE). This streamlined process can enhance your overall operational efficiency significantly.
  • 44
    Photon OS Reviews
    Photon OS™ is a minimal, open-source Linux container host designed specifically for cloud-native applications, cloud platforms, and VMware infrastructure. With the release of Photon OS 3.0, there are new features such as support for ARM64 architecture, enhancements to the installer, and refreshed package updates. We welcome collaboration from partners, customers, and community members in leveraging Photon OS for running efficient virtual machines and containerized applications. This OS includes everything necessary for installation, and users can select either a minimal or a comprehensive installation based on their deployment requirements. Photon OS can be installed directly from an ISO file or utilized in PXE/kickstart environments for automated setups. This makes it a portable and ready-to-use virtual environment. Additionally, the Photon OS Open Virtual Appliance packages come with a refined and optimized kernel, as well as packages designed to facilitate and standardize appliance deployments. By utilizing Photon OS, developers can create and build modern applications effectively in a streamlined development environment. In essence, Photon OS stands out as a versatile solution for various cloud-centric needs.
  • 45
    Gremlin Reviews
    Discover all the essential tools to construct dependable software with confidence through Chaos Engineering. Take advantage of Gremlin's extensive range of failure scenarios to conduct experiments throughout your entire infrastructure, whether it's bare metal, cloud platforms, containerized setups, Kubernetes, applications, or serverless architectures. You can manipulate resources by throttling CPU, memory, I/O, and disk usage, reboot hosts, terminate processes, and even simulate time travel. Additionally, you can introduce network latency, create blackholes for traffic, drop packets, and simulate DNS failures. Ensure your code is resilient by testing for potential failures and delays in serverless functions. Furthermore, you have the ability to limit the effects of these experiments to specific users, devices, or a certain percentage of traffic, enabling precise assessments of your system's robustness. This approach allows for a thorough understanding of how your software reacts under various stress conditions.
  • 46
    Omnissa Horizon 8 Reviews
    Enhance the experience of digital workspaces by ensuring the effective and secure distribution of virtual desktops and applications, whether hosted on-premises or in the cloud. Horizon 8 serves as an innovative solution for the secure provision of virtual desktops and applications within a hybrid cloud environment, brought to you by a leader in software-defined data centers and digital workspaces. Utilizing distinctive integration with reliable technologies, Horizon 8 empowers IT teams to efficiently deploy and expand virtual desktops and applications from a unified control plane, featuring quick provisioning, automation, and streamlined management, thereby ensuring an exceptional digital workspace experience for users. Administrators can effectively oversee desktops and applications across private, hybrid, and multi-cloud infrastructures through a cloud-based console and SaaS management offerings. Additionally, the inherent security integrated into the Horizon infrastructure facilitates highly secure remote access to organizational resources, ensuring robust protection from the endpoint to the data center and extending all the way to the cloud. In this way, organizations can confidently embrace digital transformation while maintaining a focus on security and user satisfaction.
  • 47
    VMware ESXi Reviews
    Explore a powerful bare-metal hypervisor that can be directly installed on your physical server. By providing immediate access to and management of the underlying hardware resources, VMware ESXi efficiently divides the server's capabilities to merge applications and reduce expenses. This hypervisor is recognized as the industry standard for effective architecture, exemplifying reliability, high performance, and excellent support. As IT teams face ongoing challenges to adapt to changing market demands and increased customer expectations, they also need to optimize their resources for more complex projects. Thankfully, ESXi aids in achieving a balance that promotes improved business results while also ensuring cost savings in IT operations. Its design not only enhances operational efficiency but also empowers organizations to innovate without compromising their budgets.
  • 48
    Leaseweb Reviews
    Customers of LeaseWeb benefit from access to a vast and advanced network, recognized as one of the largest worldwide. With 43 points of presence and 29 Internet Exchanges globally, our network provides exceptional bandwidth capacity, lightning-fast speeds, and unparalleled connectivity to support your workloads. We've established top-tier, ISO-certified data centers at key locations around the globe, ensuring optimal access to major business hubs in Europe, the United States, and Asia. Each facility is meticulously designed to meet the highest standards for performance, reliability, and security. The Customer Portal and API empower you to take charge of your infrastructure, enabling you to configure everything to your exact specifications. With a user-friendly interface and a comprehensive set of features, you can manage every facet of your infrastructure seamlessly. This level of control allows you to tailor your experience, ensuring it meets your specific needs.
  • 49
    Maestro Reviews
    DevOps Orchestration involves the integration of various tasks throughout the Software Development Life Cycle (SDLC) and Operations, allowing for flexibility in tool and environment selection while centralizing process logic away from specific tools. The Maestro solution offers a variety of plug-ins, pre-built tasks, and templates designed for continuous integration, test automation, release management, enhanced DevOps visibility, automated deployment, and seamless continuous delivery. Regardless of whether your DevOps tools are hosted on-premise or in the cloud—or a combination of both—Maestro facilitates smooth connections between workflow tasks for Continuous Integration and Continuous Deployment. The depicted workflow "CompositionTM" illustrates processes such as a Git checkout, Jenkins build, Sonar code analysis, testing phases, and custom notifications. By eliminating manual tasks from your tailored release workflow, you can establish an accurate and repeatable series of operations that function reliably each time, ensuring consistency and efficiency in your deployments. This approach not only streamlines processes but also empowers teams to focus on innovation rather than repetitive tasks.
  • 50
    PT AF Reviews

    PT AF

    Positive Technologies

    PT AF — Web Application Firewall is a versatile and precise solution designed to comprehensively safeguard applications, APIs, users, and infrastructure from web-based threats. This advanced firewall system excels in identifying and mitigating attacks that align with the OWASP Top 10, WASC threats, layer 7 DDoS, and zero-day vulnerabilities with remarkable accuracy. It guarantees ongoing security for various components while aiding adherence to essential security standards such as PCI DSS. The multitude of deployment options available allows for swift and straightforward implementation across diverse infrastructures, accommodating applications of varying complexities. PT AF stands out as more than a conventional tool within your IT security framework; it leverages cutting-edge technologies and integrations, including PT Application Inspector, to deliver extensive and continuous protection tailored for your applications, even those undergoing frequent development cycles. Overall, PT AF is an indispensable asset for any organization serious about maintaining a robust security posture amidst ever-evolving cyber threats.
  • Previous
  • You're on page 1
  • 2
  • Next