Business Software for VMware Cloud - Page 4

Top Software that integrates with VMware Cloud as of July 2025 - Page 4

  • 1
    xCAT

    xCAT

    xCAT

    xCAT (Extreme Cloud Administration Toolkit) is an open source tool designed to automate the deployment, scaling, and management of bare metal servers and virtual machines. It offers comprehensive management capabilities for high-performance computing clusters, render farms, grids, web farms, online gaming infrastructures, clouds, and data centers. xCAT provides an extensible framework based on years of system administration best practices, enabling administrators to discover hardware servers, execute remote system management, provision operating systems on physical or virtual machines in both disk and diskless modes, install and configure user applications, and perform parallel system management. The toolkit supports various operating systems, including Red Hat, Ubuntu, SUSE, and CentOS, and is compatible with architectures such as ppc64le, x86_64, and ppc64. It integrates with management protocols like IPMI, HMC, FSP, and OpenBMC, facilitating remote console access.
    Starting Price: Free
  • 2
    ProSBC

    ProSBC

    TelcoBridges

    ProSBC is a carrier-grade SBC that offers enhanced capabilities for service providers and enterprises. It supports up to 60,000 simultaneous sessions and includes features like media transcoding, STIR/SHAKEN support, fraud detection, and high availability configurations. ProSBC is compatible with multiple platforms, including VMware, KVM/Proxmox, AWS, Microsoft Azure, and bare-metal servers. It is suitable for various use cases, such as SIP trunking, enterprise SIP trunking, CPaaS access, and TDM-to-SIP migration. ProSBC is widely interoperable with major VoIP platforms and carrier networks. Easy to deploy, operate and manage through a web-based interface. The optional TB Analytics feature pack aids in helping diagnose network problems. The same software can scale from 100 to 60,000 sessions, so your SBC is ready when you are.
    Starting Price: $625 per year
  • 3
    Enov8

    Enov8

    Enov8

    End-to-end “Business Intelligence” for your IT organization. Promoting transparency, control, and productivity across environments, release and data. Promote scaled agility across your IT fabric. A complete environment and release picture supporting collaboration across teams and providing the insight that organizations require today to drive competitive innovation. Improve visibility of your complex IT fabric allowing better collaboration and decision making. Manage complex computer systems & the end-to-end IT fabric through a centralized portal. Measure test environment usage to reduce IT spend and increase project productivity. Eliminate chaotic and non-repeatable operations by establishing control via centralized runbooks and using automation on regular & time consuming tasks. Manage change and contention effectively whilst providing real time health status and powerful analytics to determine business impact.
    Starting Price: $8 per month
  • 4
    Barracuda SSL VPN
    Your army of road warriors and remote workers require a quick, flexible, reliable and completely secure way to connect to your internal enterprise applications, information and network resources. They want to do this from anywhere in the world, at any time and from any suitable device. The Barracuda SSL VPN provides the security and connectivity to deliver this access, via a web browser or virtually any mobile device. The Barracuda SSL VPN makes it easy for remote users to access internal applications and files. Unlike traditional VPN technologies, the Barracuda SSL VPN does not require any additional client software or complicated settings. Logging in from home or the road requires only a web browser and Internet connection. Upon login, users are presented with a portal of internal web applications or file shares. More advanced applications like Remote Desktop Services or Citrix XenApp are available to users running Java.
  • 5
    STORServer VMB

    STORServer VMB

    STORServer

    STORServer® Virtual Machine Backup (VMB) lets you back up and archive VMware virtual machines to your IBM Spectrum® Protect server on a STORServer Appliance or in an existing IBM Spectrum Protect environment. STORServer VMB can be installed and configured quickly, takes minutes a day to manage, and is an ideal solution for businesses backing up virtual environments. STORServer VMB supports the use of two different backup technologies, one developed by STORServer (VMB Native, which is used by default) and the other, VMB Spectrum, which is based on IBM Spectrum Protect for Virtual Environments, Data Protection for VMware. You may configure STORServer VMB to use the backup technology that best meets your backup needs. Virtual machine (VM) data is moved directly to and from VMs and IBM Spectrum Protect storage pools without ESX/ESXi server involvement. Changed block tracking (CBT) minimizes the amount of data transferred.
  • 6
    Docusnap

    Docusnap

    itelio

    Docusnap inventories your network infrastructure, hardware, and software as well as common application servers. With Docusnap, you can easily create network maps and evaluation reports as well as operation manuals and contingency plans. Docusnap shows you who has access to which data and if your software is correctly licensed. You can also identify existing IT dependencies. Docusnap captures information of the network infrastructure, hardware and software as well as common application servers. Let Docusnap generate reports and maps of your network. Create contingency plans and operation manuals. Learn who has access to which data and whether your software is licensed correctly. Identify IT dependencies. At itelio, the focus is on the team! The company’s success is fueled by our highly skilled and motivated employees. By now, itelio GmbH has been able to secure the skills of about 90 experts from various nations.
  • 7
    EnviMonitor

    EnviMonitor

    DTM Datentechnik Moll

    Advanced monitoring equipment for server rooms and data centers. Web-based manufacturer-independent application without software installation. Runs on any terminal device with web capability. The web-based software enables you to perform remote monitoring of a data center from any terminal device with web capability. EnviMonitor can be used to monitor the environment conditions in server rooms from Android, Apple and Windows smartphones and tablet computers without needing to install any software. The intuitive and clearly arranged software and its unmatched cost/performance ratio have convinced the professional jury of the German Data Center Award. EnviMonitor is a software for monitoring the environment in a data center. The status of the components to be monitored can be shown in a very clear-cut and concise layout with graphic tiles representing sensors and by arranging sensors in groups.
    Starting Price: €3,000
  • 8
    iMonitor 365

    iMonitor 365

    iMonitor Software

    We provide remote computer monitoring software for small and medium-sized enterprises. Keystrokes, screenshots, chat, web, print, file, USB storage, clipboard, live desktop... Based on cloud, iMonitor 365 can monitor employee's computer and internet activities from anywhere in real-time. The target clients of iMonitor 365 are basically small and medium enterprises. We can quickly and efficiently provide you the key information you need, and help you to increase employees' productivity. iMonitor 365 just need one agent program installed on target computer, and the installation is simple. With online console can maximumly simplify the monitoring process. No need the extra IP address setting. You can setup one account to monitor multiple computers. We provide online console which can run on any web browser, even your mobile phone's web browser.
    Starting Price: $24.95 per month
  • 9
    HYCU

    HYCU

    HYCU, Inc.

    HYCU is dedicated to providing data protection as a service. Their principal aim is to simplify the process of data mobility and safety for businesses without the stress of handling and expanding backup systems. HYCU's offerings cater to the current and future needs of a company's technological stack while promoting simplicity in its engineering. The primary focus is on the operators managing data. By discarding the complexity, risk, and expensive nature associated with traditional solutions, HYCU aims to streamline data protection, making the business environment more secure. A high priority is placed on customer satisfaction, as evidenced by a notable Net Promoter Score (NPS). The provided services seek to deliver hassle-free and cost-efficient data protection universally.
  • 10
    Sectigo

    Sectigo

    Sectigo

    Global leader in cybersecurity solutions to secure websites, connected devices, applications, and digital identities. Sectigo is a leading provider of digital identity solutions, including SSL / TLS certificates, DevOps, IoT, and enterprise-grade PKI (Public Key Infrastructure) management, as well as multi-layered web security. As the world's largest commercial Certificate Authority with more than 700,000 customers and over 20 years of experience in online trust, Sectigo partners with organizations of all sizes to deliver automated public and private PKI solutions for securing web servers, user access, connected devices, and applications. Recognized for its award-winning innovation and best-in-class global customer support, Sectigo has the proven performance needed to secure the digital landscape of today and tomorrow. Sectigo is the market leader in SSL / TLS certificates, DevOps, IoT, enterprise-grade PKI (Public Key Infrastructure) management, and multi-layered web security.
    Starting Price: $125
  • 11
    FlashBlade//S

    FlashBlade//S

    Pure Storage

    Pure FlashBlade//S is the industry's most advanced all-flash storage solution for consolidating fast file and object storage. Modernize your storage with a unified unstructured storage platform that delivers a Modern Data Experience™. Tackle your most challenging modern data requirements. FlashBlade delivers cloud-like simplicity and agility with consistent high performance and control. FlashBlade can help you address the needs of modern applications and leverage modern data. FlashBlade//S delivers massive throughput and parallelism with consistent multidimensional performance for all data. Simply add blades to scale capacity and performance. It’s fast file and object storage that goes beyond traditional scale-out NAS. FlashBlade’s scale-out metadata architecture can handle tens of billions of files and objects with maximum performance and rich data services. Purity//FB supports cloud mobility with object replication and disaster recovery with file replication.
  • 12
    GoSecure

    GoSecure

    GoSecure

    GoSecure, a recognized cybersecurity leader and innovator, combines more than 20+ years of market-leading security technology with highly skilled professionals who become an extension of in-house security team to mitigate threats before they can compromise business operations. GoSecure Titan® Managed Security Services pioneers the integration of endpoint, network, and email threat detection into a single Managed Extended Detection & Response (MXDR) service. Our GoSecure Titan® Platform offers superior visibility and protection, detecting more threats and reducing security costs with faster threat mitigation. GoSecure Professional Security Services provides a full portfolio of testing and assessment services to evaluate cybersecurity maturity, identify risks and gaps. We define a roadmap tailored to your situation, needs, and budget, improving security posture. Our Professional Services find issues, our Managed Services fix them, helping you thrive.
  • 13
    Nexpose

    Nexpose

    Rapid7

    Vulnerability management software to help you act at the moment of impact Vulnerabilities pop up every day. You need constant intelligence to discover them, locate them, prioritize them for your business, and confirm your exposure has been reduced. Nexpose, Rapid7’s on-premises option for vulnerability management software, monitors exposures in real-time and adapts to new threats with fresh data, ensuring you can always act at the moment of impact. If you’re looking for more advanced capabilities such as Remediation Workflow and Rapid7's universal Insight Agent, check out our platform-based vulnerability management software, InsightVM. How stale is your data? A few days? A few weeks? With Nexpose, you’ll never act on intel older than a few seconds. Our vulnerability management software collects data in real-time, giving you a live view of your constantly shifting network.
  • 14
    F5 BIG-IP DDoS Hybrid Defender
    Get comprehensive DDoS protection for your network and at the application layer with flexibility and scale for inline, out-of-band, and hybrid deployments. Traditional DDoS solutions focus solely on a narrow range of attacks. Here are some of the reasons they’re only partially effective: By black-holing or rate-limiting, they cripple the connections of legitimate users in network layer (or flood) attacks. They’re blind to SSL traffic and dependent on their placement in the network when application layer attacks hit. On-premises defenses are rendered useless when a WAN bandwidth saturation shuts down Internet connectivity. Fortunately, F5 BIG-IP DDoS Hybrid Defender provides a greater depth of defense. It’s the only multi-layered defense that protects against blended network attacks and sophisticated application attacks, while enabling full SSL decryption, anti-bot capabilities, and advanced detection methods, all in one appliance.
  • 15
    F5 Distributed Cloud DDoS Mitigation Service
    Cloud-delivered DDoS protection that detects and mitigates attacks before they reach your network infrastructure. In this time of uncertainty, help keep your organization safe with cloud-delivered DDoS protection that detects and mitigates attacks—before they reach you. F5 Distributed Cloud DDoS Mitigation Service is a managed, cloud-delivered protection service that detects and mitigates large-scale, SSL, or application-targeted attacks in real time—defending your business from even those attacks that exceed hundreds of gigabits per second. The F5 Security Operations Center (SOC) is on the front lines when it comes to protecting your business.
  • 16
    IBM Cloud for VMware Solutions
    What is IBM Cloud for VMware Solutions? IBM Cloud® for VMware Solutions makes it simpler for your organization to capitalize on the tremendous potential of the cloud. Migrate VMware workloads to the IBM Cloud while using existing tools, technologies and skills from your on-premises environment. The integration and automation with Red Hat® OpenShift® helps accelerate innovation with services like AI, analytics and more. A secure, compliant automated deployment architecture demonstrated for financial institutions. One of the world’s largest operators of VMware workloads, with over 15 years of experience. Right-size infrastructure and performance, with over 100 bare metal configurations. The highest data security certification in the industry, with “keep your own key” (KYOK). Extend and migrate your virtual machines (VMs) to the cloud to consolidate data centers, expand capacity to address resource constraints or replace aging infrastructure with the latest innovations in the cloud.
  • 17
    Virtana Platform
    Know before you go to the public cloud with a single AI-powered observability platform to migrate, control cost, optimize performance, monitor, and drive uptime for your infrastructure across data centers, private and public clouds. The most difficult challenges facing enterprises as they seek to leverage public clouds are how to “know before you go” which workloads to migrate and how to avoid unexpected costs and performance degradation once workloads are operating in the cloud. With the Virtana unified observability platform, you can migrate and optimize across hybrid, public, and private cloud environments. This modular hybrid-cloud infrastructure optimization platform collects high-fidelity data — then apply AIOps technologies, including machine learning and advanced data analytics to to provide intelligent observability of singular workloads to make better decisions about what to move and where to move it while still meeting performance requirements.
  • 18
    Densify

    Densify

    Densify

    Densify provides Advanced Cloud & Container Resource Management Platform that leverages machine-learning to make cloud & container workloads self-aware of their precise resource requirements, and fully automates the resource management process. With Densify, CloudOps ensure apps continuously get the optimal resources they need at the lowest possible spend. No software downloads, no implementation, no training—just outcomes. A full service, “9.5/10, spectacular”, product —ZDnet. Optimization is impossible without meticulously-accurate analytics that produce actions your application owners will trust and allow. Policy and transparency that unify Finance, Engineering, Operations, and application owners to drive continuous cost optimization. Connects with your ecosystem to feed the processes and systems required to confidently optimize.
  • 19
    Navisite DBaaS
    Deploy, monitor, provision and scale your favorite databases on AWS and Azure using Navisite’s fully managed database as a service (DBaaS) platform. With Navisite’s DBaaS, you get more than a powerful, high-speed service delivery platform. You get the expertise, services and scale you need to get ahead and stay ahead. Our fully managed DBaaS combines cloud management and automation with turnkey DBA services to reduce operating costs, speed time to market and simplify your journey to the cloud. Benefit from on-demand provisioning in the cloud, with seamless scaling and high availability via auto-failover on production-ready plans. Enable an additional layer of security with SSL-based access, and encrypt your data and backups "at-rest." Provision a database instantly, anywhere in the world, any time. Get scheduled and on-demand backups or snapshots with various restoration options for your data.
    Starting Price: $45 per month
  • 20
    Macaw

    Macaw

    Macaw Software

    Macaw is an enterprise grade platform optimized for building and transforming applications for digital age. Macaw provides an unique approach to modernize traditional applications to utilize containers and microservices technologies. It also offers a turn-key approach for enterprises to design, develop, build, publish, run and operate microservices based application in a holistic manner irrespective of the underlying infrastructure and clouds. Macaw is meant for enterprises looking to accelerate their modernization journey with hybrid-cloud strategy and cloud native applications. Thanks to its many built-in foundational services ,turnkey operational capabilities and kubernetes integration. Macaw provides the necessary run time environment, services and tools to build, deploy and manage Microservices based application. It provides various built-in and readily usable core application services like database, security, messaging, load-balancing for accelerated development and turn-key ops.
  • 21
    PrinterTux

    PrinterTux

    HE Soluções

    The PrinterTux is a software and management, control and ticketing of print. Compatible with the platforms Windows, Mac and Linux. Through printing reports by users, groups and printers, it is possible to raise the quantity and cost of all prints made in the company. The software allows you to implement quota control, thus reducing waste, in addition to expenses with ink, toner, paper and printer maintenance. In many companies, paper is the biggest source of waste, with the implementation of the PrinterTux Software, the reduction in paper consumption will be noticeable. Thus, your business will contribute to the environment. With Printertux, it is possible to generate print reports by users, groups, printers, to survey the quantity and cost of all prints made in the company. Reduce your printing costs, save and contribute to the environment! The Printertux print server, is a customized Linux distribution, based on Fedora.
  • 22
    Cyral

    Cyral

    Cyral

    Granular visibility and policy enforcement across all your data endpoints. Designed to support your infrastructure-as-code workflows and orchestration. Dynamically scales to your workloads, with sub millisecond latency. Easily clicks with all your tools with no changes to your applications. Enhance cloud security with granular data access policies. Extend Zero Trust to the data cloud. Protect your organization from data breaches. Increase trust with your customers and provide assurance. Cyral is built to handle the unique performance, deployment and availability challenges of the data cloud. With Cyral you see the full picture. Cyral’s data cloud sidecar is a featherweight and stateless interception service that enables real time observability into all data cloud activity, and granular access controls. Highly performant and scalable interception. Prevention of threats and malicious access to your data that would go otherwise undetected.
    Starting Price: $50 per month
  • 23
    Hypergate Files
    Seamless access to on-premise network shares. Let your users collaborate freely with their teams and edit all files directly on their mobile devices. Enterprise productivity is boosted by flexibility and the way you access data must be no different. There are many reasons to move some data to the cloud and there are also many to keep some of it on-premise. What is key to either approach is the user experience to access data and this needs to be simple, consistent and secure on any device, particularly mobile. With Hypergate Files users can access on-premise data with the same user experience as a computer, now on the mobile device. This means they can do their work as efficiently and accurately as possible. All file types are supported by their native apps, no special viewer, editor or custom implementation, just pure usability. As Hypergate Files is a simple file explorer solution, documents will open in their native format.
  • 24
    Hypergate Authenticator
    Hypergate Authenticator delivers a seamless and secure Single Sign On solution integrating directly with Active Directory. Hypergate Authenticator is a managed application on the mobile device that delivers a seamless and secure Single Sign-On solution integrating directly with your Active Directory. The solution leverages the industry standard Kerberos to provide the best possible user experience without compromising on security. Enable SSO specifically with Android Enterprise which is otherwise not available. Hypergate is fast, not only when interacting with the User, also when implementing it. Enable your Users with Kerberos authentication by simply pushing Hypergate on their device. If there is an issue with the password of the user, this can be varied and changed by them directly on their device, without contacting IT staff for help (SSPR). No dependence on having to use a computer to reset the password. With Hypergate, you can allow staff to become truly mobile.
  • 25
    Imperva CDN
    Deploying your websites and applications around the globe can lead to more cyber attacks and fraud, unless you have effective security. The Imperva Content Delivery Network (CDN) brings content caching, load balancing, and failover built natively into a comprehensive Web Application and API Protection (WAAP) platform, so your applications are securely delivered across the globe. Let machine learning do the work for you. It efficiently caches your dynamically-generated pages, while ensuring content freshness. This significantly improves cache utilization and further reduces bandwidth usage. Take advantage of multiple content and networking optimization techniques to minimize page rendering time and improve user experience. Imperva’s global CDN uses advanced caching and optimization techniques to improve connection and response speeds while lowering bandwidth costs.
  • 26
    Imperva WAF
    Web application attacks prevent important transactions and steal sensitive data. Imperva Web Application Firewall (WAF) analyzes traffic to your applications to stop these attacks and ensure uninterrupted business operations. A noisy WAF forces you to choose between blocking legitimate traffic or manually containing attacks your WAF let through. Imperva Research Labs ensure accuracy to WAF customers as the threat landscape changes. Automatic policy creation and fast rule propagation empower your security teams to use third-party code without risk while working at the pace of DevOps. Imperva WAF is a key component of a comprehensive Web Application and API Protection (WAAP) stack that secures from edge to database, so the traffic you receive is only the traffic you want. We provide the best website protection in the industry – PCI-compliant, automated security that integrates analytics to go beyond OWASP Top 10 coverage, and reduces the risks created by third-party code.
  • 27
    Imperva DDoS Protection
    Imperva DDoS Protection secures all your assets at the edge for uninterrupted operation. Ensure business continuity with guaranteed uptime. When it comes to DDoS mitigation, the rule of thumb is: ‘moments to go down, hours to recover’. This is why, when defending against an attack, every second counts. Imperva gives you the peace of mind that attack traffic will be automatically blocked at the edge – without you having to scale up in bandwidth to pay for it. Imperva DDoS Protection for Websites is an always-on service that immediately mitigates any type or size of DDoS attack targeting web applications. Our DDoS protection for websites complements the Imperva cloud web application firewall (WAF), which blocks hacking attempts and attacks by malicious bots. A change to your DNS records ensures that all HTTP/S traffic to your domain(s) is routed through the Imperva network. Acting as a secure proxy, Imperva DDoS protection for websites masks your origin server IP.
  • 28
    Prosimo

    Prosimo

    Prosimo

    Applications are fragmented & distributed. The proliferation of infrastructure stacks across multi-cloud for users to access applications and to talk to each other creates complexity. The result is subpar application experience, increased operational cost, and fragmented security. Today's multi-cloud world requires a new Application eXperience Infrastructure stack—one that improves user application experience, provides secure access and optimizes cloud spend so that you can focus on business outcomes. The Prosimo Application eXperience Infrastructure (AXI) is a vertically integrated cloud-native infrastructure stack that sits in front of applications and delivers consistently faster, more secure application experiences cost-optimized. AXI gives cloud architects and operations teams a decision-oriented platform that is easy to use. Powered by data insights and machine learning models, the Prosimo AXI platform delivers better results in minutes.
  • 29
    Scuba Database Vulnerability Scanner
    Scuba Database Vulnerability Scanner. Download Scuba, a free tool that uncovers hidden security risks. Scan enterprise databases for vulnerabilities and misconfiguration. Know the risks to your databases. Get recommendations on how to mitigate identified issues. Available for Windows, Mac, Linux (x32), and Linux (x64), Scuba offers over 2,300 assessment tests for Oracle, Microsoft SQL, SAP Sybase, IBM DB2 and MySQL. Scuba is a free tool that scans leading enterprise databases for security vulnerabilities and configuration flaws, including patch levels, that allows you to uncover potential database security risks. It includes more than 2,300 assessment tests for Oracle, Microsoft SQL Server, SAP Sybase, IBM DB2 and MySQL. It’s possible to run a Scuba scan from any Windows, Mac or Linux client. Depending on your database size, users, groups and network connection, an average Scuba scan normally takes 2-3 minutes. No pre-installation or other dependencies are required.
  • 30
    Actian Avalanche
    Actian Avalanche is a fully managed hybrid cloud data warehouse service designed from the ground up to deliver high performance and scale across all dimensions – data volume, concurrent user, and query complexity – at a fraction of the cost of alternative solutions. It is a true hybrid platform that can be deployed on-premises as well as on multiple clouds, including AWS, Azure, and Google Cloud, enabling you to migrate or offload applications and data to the cloud at your own pace. Actian Avalanche delivers the best price-performance in the industry outof-the-box without DBA tuning and optimization techniques. For the same cost as alternative solutions, you can benefit from substantially better performance or chose the same performance for significantly lower cost. For example, Avalanche provides up to 6x the price-performance advantage over Snowflake as measured by GigaOm’s TPC-H industry standard benchmark and even more against many of the appliance vendors.