Business Software for Microsoft Hyper-V - Page 4

Top Software that integrates with Microsoft Hyper-V as of November 2024 - Page 4

  • 1
    Commvault Backup & Recovery
    Ensure data availability for all workloads across cloud and on-prem environments. Wherever your data resides, ensure availability via a single interface with Commvault® Backup & Recovery. Say goodbye to costly data loss scenarios, segregated data silos, missing recovery SLAs, and inefficient scaling. Empower your team to do more. Comprehensive workload coverage (files, apps, databases, virtual, containers, cloud) from a single extensible platform and user interface. Rapid, granular recovery of data and applications, including instant recovery of virtual machines. Easily back up, recover, and move data and workloads to/from/within/between clouds. High-performance backups via storage integrations. Built-in ransomware protection including anomaly detection and reporting. Reduce costs with minimal infrastructure requirements in the cloud or on-premises. Optimize cloud vs on-premises location of data and workloads via policy-driven automation.
  • 2
    PetaSAN

    PetaSAN

    PetaSAN

    PetaSAN is a scale-out active/active storage solution offering massive scalability and performance. PetaSAN uses modern cloud based technologies to provide the elasticity and agility to scale up the storage cluster simply by adding more nodes; this can be done at any time and in a truly non-disruptive manner. Although PetaSAN uses different underlying technologies that are inherently complex, it provides an integrated end to end solution that is very easy to install and operate. PetaSAN can be operated by non-Linux admins through its easy to use graphical interfaces while still allowing Linux experts full control if they wish. PetaSAN brings proven technologies powering many of today’s largest clouds to the datacenter with point and click interfaces. At the storage level PetaSAN relies on the Ceph storage engine. Ceph is the leading edge open source SDS cloud storage solution powering many of today’s private clouds and public clouds.
  • 3
    LogMan.io

    LogMan.io

    TeskaLabs

    TeskaLabs Logman.io is a modern and effective tool for log management, collection, archiving, and log analysis. Scalable Log Management can be easily upgraded to the full-scale tool TeskaLabs SIEM (security information and event management). Be always one step ahead of all potential threats and achieve a total overview of the security of your IT infrastructure. Thanks to timely and clear threat detection, TeskaLabs LogMan.io protects important data and sensitive information. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. LogMan.io ensures regulatory compliance with legislation covering cyber security and GDPR. Logman.io can grow with your needs. It can be easily upgraded to TeskaLabs SIEM. You can promptly get a central essential overview of the entire IT infrastructure, a full-scale tool for threat modeling, risk management, and vulnerability scanning.
  • 4
    TeskaLabs SIEM
    A state-of-the-art tool for security information and event management. A security surveillance tool that allows you to automatically monitor, correlate, and evaluate security events and create reports in real-time. TeskaLabs SIEM will bring a central overview of the entire company infrastructure and early detection helps eliminate risks and their possible effects on the operation of your company. TeskaLabs SIEM will always be one step ahead of potential threats and you will gain absolute supervision. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. TeskaLabs SIEM ensures regulatory compliance with legislation covering Cyber Security, GDPR, and ISO 27001:2013. Automated real-time detection and reporting of known incidents and anomalies will allow you to quickly react and prioritize the solution to individual incidents. Time savings allow you to proactively search for potential threats.
  • 5
    Unisys ClearPath Forward MCP
    For computing requirements that demand the utmost in security, resiliency, availability and scalability combined with optimal business agility, ClearPath Forward provides the foundation for simplification, controlling costs, and digital transformation. Augment staff, optimize performance and speed digital transformation of your ClearPath Forward environment with a managed service offering and cloud hosting managed, maintained and optimized by Unisys. Build a clear, actionable strategy that outlines how to evolve your applications in response to new demands with ClearPath Forward Advisory Services and ClearPath Forward Application Evolution Services. Benefit from a full range of advisory and implementation services to streamline the transition of your ClearPath Forward environment to private or public cloud.
  • 6
    Accops Digital Workspace
    The workspace has gone hybrid. A large segment of the workforce is working from home today, accessing business applications and data from various locations, using varied devices and in different ways. Thus, organizations all over the globe are looking for ways to transition from a hardware-based IT infrastructure into a completely software-defined infrastructure. They are trying to enable their workforce to be productive, secure, and seamless, regardless of their locations, or the devices and networks they use. But data security concerns, IT infrastructure complexities, and increased costs associated with setting up a digital work infrastructure pose many hurdles for organizations. Accops Digital Workspace provides a comprehensive, zero-trust-based end-user computing solution, enabling secure and instant access to business applications from anywhere, any device, and any network. The Accops solution suite includes end-user computing virtualization.
  • 7
    Accops HyWorks
    Accops HyWorks gives the modern-day professional, flexibility, and agility to work anywhere, anytime, and on any device, enhancing job satisfaction and engagement. This comprehensive product simplifies the way the IT team manages and secures apps, devices, and networks, to provide safe and seamless access to all the tools that employees need to perform at their best. And the centralized endpoint management makes it easy to control and manage all devices, virtual desktops, and applications from a central location. HyWorks not only helps you create a secure work environment but also reduces complexities, allowing your workforce to focus their creativity on core business activities, rather than worrying about system glitches, software updates, or cyber threats, thereby increasing productivity and reducing costs. Control every device, app & OS in your network to prevent security breaches, by virtualizing & delivering desktop apps from the centralized datacenter.
  • 8
    CipherTrust Tokenization

    CipherTrust Tokenization

    Thales Cloud Security

    CipherTrust Tokenization dramatically reduces the cost and effort required to comply with security policies and regulatory mandates like PCI DSS while also making it simple to protect other sensitive data including personally identifiable information (PII). While there are no tokenization standards in the industry, most tokenization solutions fall into one of two architectures: vaultless- or vaulted tokenization Both secure and anonymize sensitive assets. Tokenization software can reside in the data center, big data environments or the cloud. Tokenization can remove card holder data from PCI DSS scope with minimal cost and effort, enabling organizations to save on costs associated with compliance with the industry standard. Modern IT architectures require both use and protection of personally identifiable information (PII). With CipherTrust tokenization, PII protection is gained without encryption key management required by the software developer.
  • 9
    Barracuda Intronis Backup

    Barracuda Intronis Backup

    Barracuda Networks

    Barracuda Intronis Backup – MSP is a software-only BDR solution designed to offer value to your customers by protecting what matters most, while creating new opportunities to expand your margins and grow your business. Intronis Backup and the ECHOplatform is a software-only solution that goes beyond file-and-folder and delivers secure hybrid local and cloud backup services that offer flexible, comprehensive data protection — complemented by a simple pricing structure and a centralized management portal. Intronis Backup is available at a fixed cost per SMB site, creating cost certainty for MSPs. Fixed pricing also makes it easier for MSPs to build margins and makes data protection a growth driver. Intronis Backup includes management and reporting tools you need to support SMBs effectively. And you can maximize your efficiency thanks to our tight integrations with core MSP business tools.
  • 10
    Asigra Tigris Backup
    Asigra Tigris protects your backups from today’s new breed of attacks, improving your odds of data recovery while being easier to manage than traditional backup software. With a unique network-based data security architecture, Asigra provides inline advanced antimalware, encryption, authentication, and obfuscation features to do what traditional backup software can’t do. Protect your backup data from determined attackers so you avoid paying ransoms. Asigra deploys to the network quickly, without requiring endpoint agents, enabling smoother updates, reduced administration, and a minimized security footprint. Whether you are recovering last night's file for a user or your entire data center, you can be confident that your restores will succeed with advanced recovery capabilities. Incremental forever lets you restore backups from any point in time. Autonomic healing repairs corrupted backups automatically.
  • 11
    WOLFCOM Evidence Management System
    The WOLFCOM Evidence Management System (WEMS) is a CJIS-compliant, feature-packed, user-friendly software used by hundreds of police departments and security agencies all around the world. It makes it easy for officers to manage files, such as videos, audio, photos, and documents through an intuitive interface. Users with appropriate rights and privileges are able to generate audit trail reports, view, tag and verify the integrity of the asset, as well as automatically purge files based on the department’s retention policies and much more. The WOLFCOM Evidence Management System is designed to manage all your department’s digital evidence such as body camera videos, digital pictures, in-car videos, surveillance camera videos, documents, audio recordings, and other standard media files. This allows officers to quickly find and view digital evidence. We know that no two agencies are exactly alike, that’s why our approach is to identify your unique challenges.