Business Software for VMware Cloud - Page 5

Top Software that integrates with VMware Cloud as of July 2025 - Page 5

  • 1
    Actian Avalanche
    Actian Avalanche is a fully managed hybrid cloud data warehouse service designed from the ground up to deliver high performance and scale across all dimensions – data volume, concurrent user, and query complexity – at a fraction of the cost of alternative solutions. It is a true hybrid platform that can be deployed on-premises as well as on multiple clouds, including AWS, Azure, and Google Cloud, enabling you to migrate or offload applications and data to the cloud at your own pace. Actian Avalanche delivers the best price-performance in the industry outof-the-box without DBA tuning and optimization techniques. For the same cost as alternative solutions, you can benefit from substantially better performance or chose the same performance for significantly lower cost. For example, Avalanche provides up to 6x the price-performance advantage over Snowflake as measured by GigaOm’s TPC-H industry standard benchmark and even more against many of the appliance vendors.
  • 2
    IBM Verify
    Infuse cloud IAM with deep context for risk-based authentication to enable frictionless, secure access for your consumers and workforce. As organizations modernize hybrid multi cloud environments using a zero-trust strategy, identity and access management can no longer remain siloed. In a cloud environment, you need to develop cloud IAM strategies that use deep context to automate risk protection and continuously authenticate any user to any resource. Your journey should match your business requirements. Maintain existing investments and protect on-premises applications as you design and customize the right cloud IAM architecture to either replace or complement your infrastructure. Your users want one-click access from any device to any application. Onboard new federated applications to single sign-on (SSO), embed modern multi-factor authentication (MFA) methods, simplify logistics and give developers consumable APIs.
  • 3
    It'sMe

    It'sMe

    Acceptto

    Employees hate using passwords as much as you hate managing password vulnerabilities. More passwords and tokens lead to greater security risk, fatigue, and cost. It’s time to get rid of them for good. 89% of security professionals claim that a more advanced multi-factor authentication tool that provides continuous, behavioral authentication would improve their company’s security posture. Acceptto provides users with Intelligent MFA that intuitively authorizes access to applications and continues authenticating post-authorization. We prevent account takeovers, even if hackers have already acquired passwords. ItsMe™ Intelligent Multi Factor Authentication (MFA) increases your security by authorizing access attempts to a registered device in real-time, be it through a push notification or verification code (SMS, TOTP, email, and etc.). With our timed based one-time password (TOTP), security key, or biometric options, you can authenticate access even when offline.
  • 4
    WorkOS

    WorkOS

    WorkOS

    WorkOS provides APIs to make your app enterprise-ready, with pre-built features and integrations required by IT admins. Start selling to enterprise customers with just a few lines of code. Add Single Sign-On (SSO) to your app for free. Start selling to enterprise customers with just a few lines of code. Add Single Sign-On (and more) in minutes instead of months. WorkOS is a set of building blocks for quickly adding enterprise features to your app. Get started fast and ship quickly with a market-proven solution for your customers. Free your support team from the ongoing headache of configuring SSO for enterprise customers. The Admin Portal is a hosted interface for IT admins to directly set up WorkOS. WorkOS provides a single, elegant interface that abstracts dozens of enterprise integrations. This means you're up-and-running 10x faster and can focus on building unique features for users instead of debugging legacy protocols and fragmented IT systems.
    Starting Price: $49 per user per month
  • 5
    Spoom

    Spoom

    Spoom

    Do you really have the overview? Different reports are created throughout the company, data and statistics are kept up to date and a lot of time is spent on this. Sales, marketing, customer service, production, HR, they all have their reportings & KPIs, but what do you do with all these data? Does every stakeholder get to see it? Do you remember why you track all these data? Can you see the impact of these KPIs on your companies goals & vision? And above all, does everyone know about its existence? Make connections between different data that were previously spread across different departments. Visualize the impact of KPIs on your companies goals and vision, and discover new opportunities. Create clarity when you and your employees need it most and see the impact of data on your future business, company and teams. Make sure everybody is on the same page and every action taken by your employees can be linked to your strategy.
    Starting Price: €40 per user per month
  • 6
    6connect

    6connect

    6connect

    Revolutionary network automation & provisioning for ISP's and enterprises around the world. Easy to deploy and integrate with, whether you use the 6connect cloud or deploy ProVision behind the firewall. Regain your sanity. Avoid the costly pitfalls of ad hoc solutions and manual network resource management. Global resource management, complete IPAM automation, easy management of DNS, DNSSEC, and DHCP. Flexible data model that seamlessly supports multi-tenant permissions, works with RADIUS, LDAP, 2FA, SAML2. Integrates, synchronizes and automates workflows over a dozen DNS platforms. Also makes migrations a snap! Easy DHCP configuration and scope management that integrates with other systems. From allocation to assignment, from CGN to IPv6, ProVision knows how to handle IPs. Carrier-grade API for easy integration across global system, fast, well documented and tested. Easy to use Peering workflows built-in – from email to BGP config pushes to reporting, it’s all there.
  • 7
    Ricoh

    Ricoh

    Ricoh

    Accelerate growth with scalable public, private, and hybrid cloud solutions. Cloud computing frees you to focus on your core business goals. You get the technology, tools, and apps you need – without traditional infrastructure limitations and necessary ongoing maintenance costs. When you choose the public cloud, you choose high-performance, secure, and cost-effective business tools that don’t require in-house infrastructure or staff to setup. For many companies, the minimal start-up costs and pay-as-you-go fees make the public cloud an attractive way to get started. Initial assessment. Strategic planning for the optimal cloud solution. Build and deployment. Security management of all users to ensure functionality, compliance, and disaster recovery process implementation. Post-setup support. Proactive scanning, monitoring, and reporting to ensure optimal use and maximum data security.
  • 8
    OfficeScan

    OfficeScan

    Trend Micro

    The threat landscape used to be black and white, you kept the bad stuff out and the good stuff in. Now it’s harder to tell the good from the bad, and traditional signature-based antivirus approaches alone are a weak defense against ransomware and unknown threats, which often slip through. Next-generation technologies help with some threats but not others, and adding multiple anti-malware tools on a single endpoint results in too many products that don’t work together. To complicate matters your users are increasingly accessing corporate resources from a variety of locations and devices, and even services in the cloud. You need endpoint security that is smart, optimized, and connected, from a proven vendor you can trust. Trend Micro™ OfficeScan™ infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint.
  • 9
    Trend Micro ServerProtect
    Enterprise servers can be a vulnerable, centralized point of information exchange. Even from inside the network, users or applications without adequate protection can unintentionally upload infected files to the server, which can spread to other systems that access these files. Additionally, large organizations may have hundreds or thousands of individual server machines that require monitoring, configuration, and maintenance. More importantly, today’s sophisticated attacks can target multiple points on the network and leave unseen trails of damage and the potential for re-infection. Trend Micro™ ServerProtect™ delivers the industry’s most reliable virus, spyware and rootkit protection while simplifying and automating security operations on servers. ServerProtect scans and detects malware in real time and incorporates cleanup capabilities to help remove malicious code and repair system damage.
  • 10
    ScanMail

    ScanMail

    Trend Micro

    More than 90 percent of targeted attacks begin with a spear phishing email, which means your mail server security is more important than ever. Unfortunately, most mail server security solutions, including the limited set of built-in protections in Microsoft® Exchange™ 2013 and 2016, rely on pattern file updates, which only detect traditional malware. They don’t include specific protections to detect malicious URLs or document exploits commonly used in targeted attacks or advanced persistent threats (APTs). ScanMail™ Suite for Microsoft® Exchange™ stops highly targeted email attacks and spear phishing by using document exploit detection, enhanced web reputation, and sandboxing as part of a custom APT defense, protection you don’t get with other solutions. In addition, only ScanMail blocks traditional malware with email, file, and web reputation technology and correlated global threat intelligence from Trend Micro™ Smart Protection Network™ cloud-based security.
  • 11
    Trend Micro PortalProtect
    Many organizations use Microsoft SharePoint to connect with employees, partners, and customers for real-time collaboration. SharePoint capabilities enable businesses to move beyond simple content repositories, helping employees build team sites, create intranet and extranet portals, utilize wikis and blogs, and create social communities. These dynamic collaboration environments help improve your productivity, but they also increase your security risks, especially when opened to external parties. Trend Micro PortalProtect secures your collaborations with a dedicated layer of protection that guards against malware, malicious links, and other threats that SharePoint administrators are often unaware of. Its web reputation technology blocks malicious links from entering your web portals, while its powerful content filtering scans both files and web components of SharePoint.
  • 12
    NetApp Virtual Storage Console
    NetApp Virtual Storage Console (VSC) for VMware vSphere is a vCenter Server plug-in that integrates with VMware environments to provide end-to-end lifecycle management for virtual machines utilizing NetApp storage systems. By offering visibility and management capabilities directly within the vCenter console, VSC enables administrators to perform tasks that enhance both server and storage efficiency. Key features include provisioning and cloning of datastores, optimization of ESXi host configurations according to NetApp best practices, and monitoring of storage performance and health. Additionally, VSC includes the VASA Provider for managing VMware Virtual Volumes (vVols) and the Storage Replication Adapter (SRA) for integration with VMware Site Recovery Manager, facilitating robust data protection and disaster recovery solutions.
  • 13
    HPE SimpliVity 380

    HPE SimpliVity 380

    Hewlett Packard Enterprise

    HPE SimpliVity 380 gives IT organizations the agility and economics of the cloud with the control and governance of on-premises IT. It delivers a powerhouse hyperconverged solution optimized to support the world’s most efficient and resilient data centers. This solution dramatically simplifies IT by combining infrastructure and advanced data services for virtualized workloads on a single device. Delivered on HPE ProLiant DL380 servers, the HPE SimpliVity 380 is a compact, scalable, 2U rack-mounted building block that consolidates server, storage, and storage networking services. By delivering a complete set of advanced functionalities, SimpliVity solutions enable dramatic improvements in the operational efficiency, management, protection, and performance of all virtualized workloads for a fraction of the cost and complexity compared to today’s traditional infrastructure stack.
    Starting Price: $68 per month
  • 14
    StoneFly

    StoneFly

    StoneFly

    StoneFly is the provider of high-performing, elastic and always available IT infrastructure solutions. Coupled with StoneFusion, our intelligent & patented operating system architecture, we can support your data dependent processes and applications seamlessly anywhere, anytime. Configure backup, replication, disaster recovery, scale out block, file and object storage in private and / or public clouds. Support virtual, container hosting & more. StoneFly also offers Cloud data migration services for email, archives, documents, SharePoint and physical and virtual storage. Total backup and disaster recovery solutions in a single appliance or cloud solution. Hyperconverged options allow physical machines to be restored as virtual machines running directly on the StoneFly disaster recovery appliance for instant recovery.
    Starting Price: $499
  • 15
    AuthPoint

    AuthPoint

    WatchGuard

    Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access. Ultimately, WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. AuthPoint uses a push message, QR code, or one-time password (OTP) as an additional factor proving your identity, and our mobile device DNA matches the authorized user’s phone when granting access to systems and applications. Therefore, any attacker who clones a user’s device in an attempt to access a protected system would be blocked.
  • 16
    GigaSECURE

    GigaSECURE

    Gigamon

    The GigaSECURE® Security Delivery Platform is a next-generation network packet broker focused on threat prevention, detection, prediction and containment. The right tools get the right traffic at the right time, every time. Enable network security tools to keep up with increasing network speed. Gain insight into network traffic. Optimize and deliver relevant data for tool consumption. Reduce tool sprawl and lower costs. Efficient prevention coupled with rapid detection and containment improves your overall security posture. Threats don't stand a chance. GigaSECURE enables security teams to obtain broad access to and control of network data, no matter where it resides. It can be customized to extract specific application sessions, metadata and decrypted traffic. In this architecture, security tools can operate inline or out-of-band at peak performance without compromising network resiliency or speed.
  • 17
    Intel Tiber AI Studio
    Intel® Tiber™ AI Studio is a comprehensive machine learning operating system that unifies and simplifies the AI development process. The platform supports a wide range of AI workloads, providing a hybrid and multi-cloud infrastructure that accelerates ML pipeline development, model training, and deployment. With its native Kubernetes orchestration and meta-scheduler, Tiber™ AI Studio offers complete flexibility in managing on-prem and cloud resources. Its scalable MLOps solution enables data scientists to easily experiment, collaborate, and automate their ML workflows while ensuring efficient and cost-effective utilization of resources.
  • 18
    Harmony Mobile

    Harmony Mobile

    Check Point

    In the new normal, while employees are increasingly accessing corporate data from their smartphones, your business is exposed to breaches more than ever. Harmony Mobile delivers complete protection for your mobile workforce that is simple to deploy, manage and scale. Protecting corporate data across the mobile attack surface: apps, networks and OS. Scalable and easy-to-manage security for any type of mobile workforce. Quick user adoption with zero impact on user experience or privacy. Prevents malware from infiltrating employees’ devices by detecting and blocking the download of malicious apps in real-time. By extending Check Point’s industry-leading network security technologies to mobile devices, Harmony Mobile offers a broad range of network security capabilities. Ensures devices are not exposed to compromise with real-time risk assessments detecting attacks, vulnerabilities, configuration changes, and advanced rooting and jailbreaking.
  • 19
    Automai Robotic Process Automation
    Automai provides Robotic Process Automation (RPA) to automate and manage even the most complicated front and back office tasks on any application(s). No scripting. Record your scenario, then edit or build on it with simple commands in the clear interface provided. Automai has the only RPA product that shares a platform with testing and monitoring components allowing scenarios to be built once and utilized in a variety of functions in the same enterprise. With Automai Robotic Process Automation (RPA), you CAN automate those repetitive tasks and processes. We’ve been using and improving our robotic automation technology for a long time, since it we started emulating human behavior for our automated testing solutions in 2000. And it’s the best out there. Our robotic automation intelligently copes with changing variables that human’s process in decision-making every day, learning what’s important to your business, and adapting so you can focus on bigger issues.
  • 20
    VyOS

    VyOS

    VyOS Networks

    Democratizing how we access networks through a universal router and open source software. Our vision at VyOS is to dramatically change how we access networks so that we can all build the solutions we always dreamed of, without restrictions, limitations, or prohibitive costs. We fundamentally believe that internet access is as vital to our human development as air, food, water, and healthcare. Built by engineers for engineers, VyOS is an open source software company that democratizes how we access networks so that the many, not the few, benefit from building solutions without limitations and prohibitive fees. We do this as VyOS through our open source software and virtual platforms. Stateful firewalls, zone-based firewall, all types of source and destination NAT (one to one, one to many, many to many). The entire codebase and build toolchain are available to everyone for auditing, building customized images and contributing.
    Starting Price: $1000
  • 21
    Beats

    Beats

    Elastic

    Beats is a free and open platform for single-purpose data shippers. They send data from hundreds or thousands of machines and systems to Logstash or Elasticsearch. Beats are open source data shippers that you install as agents on your servers to send operational data to Elasticsearch. Elastic provides Beats for capturing data and event logs. Beats can send data directly to Elasticsearch or via Logstash, where you can further process and enhance the data, before visualizing it in Kibana. Want to get up and running quickly with infrastructure metrics monitoring and centralized log analytics? Try out the Metrics app and the Logs app in Kibana. For more details, see Analyze metrics and Monitor logs. Whether you’re collecting from security devices, cloud, containers, hosts, or OT, Filebeat helps you keep the simple things simple by offering a lightweight way to forward and centralize logs and files.
    Starting Price: $16 per month
  • 22
    Azure Disk Storage
    Designed to be used with Azure Virtual Machines and Azure VMware Solution (in preview), Azure Disk Storage offers high-performance, durable block storage for your mission- and business-critical applications. Confidently migrate to Azure infrastructure with four disk storage options for the cloud—–Ultra Disk Storage, Premium SSD, Standard SSD, and Standard HDD—to optimize costs and performance for your workload. Get high performance with sub-millisecond latency for throughput and transaction-intensive workloads such as SAP HANA, SQL Server, and Oracle. Run clustered or high-availability applications cost effectively in the cloud using shared disks. Get consistent enterprise-grade durability with a 0% annual failure rate. Meet demand without performance disruption by using Ultra Disk Storage. Secure your data with automatic encryption using Microsoft-managed keys or your own.
  • 23
    SAP Internet of Things
    Leverage IoT-enriched business insights to embed in and extend business processes for transformative outcomes. The SAP Internet of Things solution offers capabilities to address industrial IoT use cases. As the IoT layer of SAP’s Business Technology Platform, it enables users to reimagine business processes and models with embedded IoT services and data. The SAP Internet of Things (SAP IoT) solution has a reference architecture that offers business services and specific capabilities to address critical industrial IoT use cases across manufacturing, supply chain, logistics, assets, products, service management, and more. Cloud service for building IoT applications and integration to business applications. Big Data that's built-in and managed. IoT data enriched with business context, rules, and event-driven integration framework. Analytical services with live integration to SAP Analytics Cloud.
  • 24
    IBM Watson IoT Platform
    A fully managed, cloud-hosted service with capabilities for device registration, connectivity, control, rapid visualization and data storage. From chip to app to cloud, take full advantage of cognitive Watson APIs, visual dashboards, rich developer resources and industry-leading security to accelerate enterprise IoT insight. Predictive real-time and edge analysis of user, machine and environmental data that leverages machine learning and cognitive APIs. Govern applications and devices within an IoT ecosystem: usage and performance patterns, anomaly detection, data and transaction validation. Connect IoT devices, networks and gateways through a growing ecosystem that uses open standards-based communications like MQTT and HTTPS. Identify, aggregate and transform data from your IoT sources into asset-based data structures. Use your IoT data to understand current conditions and trends, comprehend unstructured data from videos and images, and extract unstructured textual data for insights.
  • 25
    Barracuda PST Enterprise
    PST files are often used by end-users as personal email archives. As a result, they are typically scattered widely across end-user devices and network storage, which makes them notoriously difficult to discover and manage consistently or effectively. Thanks to improvements to Microsoft Exchange and Office 365, your users no longer need to store data locally within PST files. However, legacy PST files still contain important data that you need to bring back under control. Barracuda PST Enterprise is designed specifically to help you address this challenge. You may have many terabytes of data stored in PST files located on end-user devices and on network servers. And these files are notoriously unreliable, since they are often corrupted and easily misplaced. The costs associated with storing, securing, and managing these large files, in terms of both system resources and IT administrative overhead, are significant.
  • 26
    SAP Data Services
    Maximize the value of all your organization’s structured and unstructured data with exceptional functionalities for data integration, quality, and cleansing. SAP Data Services software improves the quality of data across the enterprise. As part of the information management layer of SAP’s Business Technology Platform, it delivers trusted,relevant, and timely information to drive better business outcomes. Transform your data into a trusted, ever-ready resource for business insight and use it to streamline processes and maximize efficiency. Gain contextual insight and unlock the true value of your data by creating a complete view of your information with access to data of any size and from any source. Improve decision-making and operational efficiency by standardizing and matching data to reduce duplicates, identify relationships, and correct quality issues proactively. Unify critical data on premise, in the cloud, or within Big Data by using intuitive tools.
  • 27
    ThirdEye

    ThirdEye

    LogicVein

    ThirdEye by LogicVein includes advanced network configuration and change management (NCCM) capabilities and network monitoring system (NMS) for large enterprise data centers. ThirdEye is an integrated and cloud ready solution. Including the tools, reporting, automation and integration capabilities you need in a low cost and easy to use package. With ThirdEye, you will reduce cost, save time, manage your configurations and changes, in addition, be alerted if there are any issues with your devices. ThirdEye has all the features and functions of Net LineDancer, with enhanced additional features that allow you to monitor, alert and generate traps on devices. All the features you have in Net LineDancer, you still have in Thirdeye, but with the additional enhanced features of performance monitoring and alarming. By creating a dashboard for each site or system, you can check the monitoring status for each site at a glance.
  • 28
    SOLIDserver DDI

    SOLIDserver DDI

    EfficientIP

    The SOLIDserver™ DDI suite is designed to deliver highly scalable, secure and robust virtual and hardware appliances for critical DNS-DHCP-IPAM services. It provides vital benefits for the agility, reliability, and security of your network infrastructure. SOLIDserver is the cornerstone of DNS, DHCP and IP Address Management (DDI) projects for datacenter automation, internet DNS, LAN infrastructures, cloud computing, digital transformation and any IT organization dealing with the challenges of a dynamic and secure infrastructure. DDI helps software defined networking (SDN) become fully integrated to the whole IT ecosystem, from orchestration of application deployment to IT Service Management (ITSM) process control. EfficientIP DDI appliances strengthen your core network foundations to support your business imperatives to improve business continuity and decrease operating costs with smart automation.
  • 29
    Redstation

    Redstation

    Redstation

    Build out your ideal hosting environment on our bare metal servers, faster than public cloud and up to ten times cheaper. Our nationwide, superfast fibre network provides low-latency massive capacity bandwidth connectivity at any location. Whether it's bare metal or public cloud, our solutions architects will help design a platform that ticks all the boxes. Total end-to-end ownership of our vast infrastructure guarantees rapid responses and the lowest price point for every solution. We have embarked upon a mission to ensure all aspects of our infrastructure are built to exacting standards and have been independently verified and accredited to deliver any solution that you have a hosted requirement for. Whether it’s for public sector, NHS, financial compliance for FCA regulated companies or PCI-DSS accredited platforms, or adherence to recognised business processes and service frameworks, we are committed to delivering a base infrastructure that can host any highly secure environment.
  • 30
    IBM Cloud Bare Metal Servers
    IBM Cloud Bare Metal Servers on IBM Cloud Classic Infrastructure are presented as ideal for large, steady state, predictable operations that rely on traditional cloud networking. IBM Cloud Bare Metal Server can be customized with over 11 million different configuration combinations. IBM boasts 17% lower prices, on average, and included 20 TB of bandwidth. Pay-as-you-use with hourly, monthly, or reserved billing at prices set for smart cost management. Choose CPU technology from Intel® Xeon® , and AMD EPYC™ , and add the latest NVIDIA Tesla GPUs. Launch our bare metal and virtual servers in the same environment over the same private VLAN. Choose your tools; integrate with providers and partners of your choice, at your convenience. Choose the billing cycle option that works for you: on-demand hourly, monthly or contract-term.
    Starting Price: $0.47 per hour