Business Software for VMware Cloud - Page 9

Top Software that integrates with VMware Cloud as of August 2025 - Page 9

  • 1
    SecureW2

    SecureW2

    SecureW2

    Even for organizations under 500 employees, a 2020 IBM report found credential compromise averaged $2.35M in costs. Eliminate the threat by using x.509 certificates for Wi-Fi, VPN, Web Apps, Endpoint Login & more. Leverage your existing Wi-Fi, Web, Firewall and VPN infrastructure with zero technology forklift upgrades. With SecureW2, you can verify that only trusted users and devices can access your network and applications. Enabling 802.1x in the cloud has never been easier. SecureW2 provides everything you need to use your Azure, Okta, or Google to enroll and manage certificates for secure Wi-Fi authentication. Plus it comes with the World’s only Dynamic Cloud RADIUS server, giving you everything you need for secure WPA2-Enterprise network authentication. Onboard every major operating system with ease and deliver secure connections with no IT burden. Secure your network with certificates using the generation, delivery, authentication and renewal technology.
  • 2
    SmartShare
    The flexible Collaboration Suite for efficient teams. SmartShare brings all crucial information about what's going on together in one single, centralized system. The famous Company Overview feature shows all possible information about a customer in one single screen: ongoing projects, deals, contracts, offerings, etc. SmartShare brings structure in the way people work and share information. Collaboration between colleagues and teams is drastically improved thanks to the centralization of information in the shared environment. Customers report a time gain of 1h per day per employee. An advanced integrated access rights management system allows to make sure that information is only accessible to persons with sufficient access rights. Access rights can be managed at multiple level: individual, team, binder, project, document, etc. Emails are managed in the shared environment, which brings a huge productivity gain and efficient collaboration.
  • 3
    KeyTalk

    KeyTalk

    KeyTalk

    KeyTalk is independent of Certificate Authorities and linked to a large number of public CAs both GMO GlobalSign and Digicert QuoVadis. Switching between CAs is simple and easy, even when thousands of certificates and end-points are involved. A vendor lock-in is therefore no longer the case. KeyTalk contains an internal CA for the generation of private certificates and keys. Did you use previously expensive public certificates for internal purposes? Or did you run into the limited functionality of Microsoft CS and other private CAs? Then, you will like our internal CA, private PKI certificate issuance. KeyTalk keeps track of the lifecycle of your certificates in a fully automated way. This way, you always have a complete and up to date overview of all your certificates, including the certificate name, SAN and validity. Also, things like used crypto keys and algorithms of internal and external certificates can be included.
  • 4
    Kumoco Cloud Manager
    Explore the capabilities of your cloud estate and find out how to make it work harder. Pilot your cloud estate from anywhere with our dashboard view, accessible from any device. Leverage utilization recommendations and lower-priced spot instances to reduce your cloud spend by up to 80%. Keep your data safe and your estate compliant with 24/7 automated monitoring from Cloud Manager. Fully automated workflows make cost recommendations and flag compliance issues so you can take action quickly and save on resource costs. Analyze your cloud costs to allocate and recharge them to your customers and internal business units. Our dashboard and advanced automation services make your cloud work harder for you. We offer structure and process that provides clarity to all team members on why the work they are doing is important and additionally provide a dashboard and trend to show the business and the delivery teams the value they are adding.
  • 5
    Replex

    Replex

    Replex

    Configure policies to manage and govern cloud-native environments without impacting agility or speed. Allocate budgets to individual teams or projects, keep track of costs, govern resource usage and generate real-time alerts for cost overruns. Track the complete asset life cycle from ownership and creation to modification and termination. Understand detailed resource consumption patterns and costs associated with decentralized development teams while engaging developers in creating value with each and every deployment. Ensure microservices, containers, pods, and Kubernetes clusters have the most efficient resource footprint possible without compromising reliability, availability, or performance. Replex allows you to right size Kubernetes nodes and cloud instances based on historical and real-time utilization data and is a single source of truth for all performance-critical metrics.
  • 6
    vCloud Usage Meter
    Licensing usage metering and automatic reporting using vCloud Usage Meter on-premises agent and vCloud Usage Insight SaaS. Get familiar with Usage Meter and Usage Insight, then download the latest version to get started. Onboard into the Automatic Reporting Service at the center of Cloud Provider Metering Architecture. Download the latest On-Premises agent for collecting license usage and reporting. Drive monthly reporting without having to lift a finger. From data collection to aggregation and reporting to the Commerce Portal, Usage Insight + Usage Meter automate the reporting process end-to-end. With Usage Meter 4.3, you can scale to larger environments within a single deployment. With In-place upgrades, you no longer need to replace the on-premises agent with each new version. Usage Insight provides a central location for downloading and viewing Usage reports. VMware stores the historical records so that partners do not need to maintain their older appliances.
  • 7
    MaxPatrol

    MaxPatrol

    Positive Technologies

    MaxPatrol is made for managing vulnerabilities and compliance on corporate information systems. Penetration testing, system checks, and compliance monitoring are at the core of MaxPatrol. Together, these mechanisms give an objective picture of the security stance across IT infrastructure as well as granular insight at the department, host, and application level, precisely the information needed to quickly detect vulnerabilities and prevent attacks. MaxPatrol makes it a cinch to keep an up-to-date inventory of IT assets. View information about network resources (network addresses, OS, available network applications and services), identify hardware and software in use, and monitor the state of updates. Best of all, it sees changes to your IT infrastructure. MaxPatrol doesn't blink as new accounts and hosts appear, or as hardware and software are updated. Information about the state of infrastructure security is quietly collected and processed.
  • 8
    Red Hat CloudForms
    Define a new, scalable cloud infrastructure. Exert control and clear structures in your cloud environment by creating separate organizations, defining relationships between users, tenants, and projects, and managing quotas and services. Provision your systems through cloud and virtualization platforms like Red Hat Enterprise Virtualization, Amazon, and Microsoft Azure, set retirement dates, and scale your environment on your terms. Take your real-world environment and simulate what-if scenarios for proactive resource planning and continuous insights into consumption levels to allow detailed chargeback, quotas, and policy creation. Get a handle on performance, capacity, and workloads through SmartState historical and trend analytics for different aspects of your cloud environment. Define the policy state for your environment, and follow up with automatic alerts and responses as your environment changes.
  • 9
    RapidScale Identity as a Service
    RapidScale’s Identity as a Service (IDaaS) is ideal for organizations wrestling with making network access easy for staff, without compromising security. Built on the backbone of Azure Active Directory, our IDaaS solution provides potent security out of the box. Protect your critical data and applications no matter where they’re located – in cloud, hosted or on-premises environments. We have options supporting single sign-on (SSO), multi-factor authentication (MFA), password synchronization, and much more. It’s easy to make your login security even stronger with our options for identity services. Employ advanced password sync functions like user password reset and changing, writeback and more, along with a wealth of other services so you can control access more finitely. It’s easy to manage your IDaaS services through our full-service portal, along with your other RapidScale solutions. Alternately, let us manage your IDaaS deployment for you.
  • 10
    Lenovo ThinkAgile HX Series
    Designed for easy deployment and manageability, Lenovo ThinkAgile HX combines Nutanix software with Lenovo's #1 reliable, high performing platforms. The ThinkAgile HX1021 certified node is a purpose-built Edge solution with right-sized compute and storage on a 1U height, half-width, and short-depth form factor meeting customer needs at remote locations. The condensed design of the solution allows new compute possibilities directly where data is being generated such as a retail, manufacturing units, gas stations, restaurants, healthcare, and education. Now enhanced with new second-generation Intel processors for even faster performance, the ThinkAgile HX portfolio is optimized for a broad set of virtualized workloads, including Remote Office Branch Office; file, print, and email applications; analytics; and in-memory databases. Lenovo platforms hold the highest number of performance world records and have ranked #1 in reliability for six consecutive years.
  • 11
    Maxta

    Maxta

    Maxta

    Maxta Hyperconvergence software gives IT the freedom to choose servers and hypervisors, scale storage independent of compute, and run mixed workloads on the same cluster. Unlike hyperconverged appliances, with Maxta there’s no vendor lock-in, no refresh tax and no upgrade tax. Use existing servers, buy pre-configured servers, or a combination of both. Appliances have a hidden cost. Never repay for software when you refresh hardware. Most storage and even hyperconverged solutions can only manage policies at the LUN, volume, or cluster level. Maxta lets you run multiple applications on the same cluster without sacrificing performance or availability. Appliance-based hyperconverged solutions make you repurchase the software license when you refresh hardware and add storage capacity only by adding additional appliances. You own your Maxta software forever and can add storage capacity by adding additional drives to servers.
  • 12
    AuthControl Sentry

    AuthControl Sentry

    Swivel Secure

    Deployed in over 54 countries and implemented across enterprises including finance, government, healthcare, education, and manufacturing, AuthControl Sentry® provides organisations with true multi-factor authentication (MFA). It delivers an intelligent solution to prevent unauthorised access to applications and data. AuthControl Sentry® has the flexibility to support a range of architectural requirements and the ability to ensure maximum adoption, thanks to its variety of authentication factors. Patented PINsafe® technology for ultimate security. Supports on-premise and cloud for changeable architecture. A single tenancy and single-tiered cloud solution ensures optimised customization. Risk-based authentication and single sign-on as standard. Integrates seamlessly with hundreds of applications. Ensures maximum adoption with an extensive range of authenticators.
  • 13
    Hitachi Unified Compute RS Series
    Scalable, seamless, and simplified cloud foundation for business agility and operational consistency. Accelerate business outcome and increase flexibility with a turnkey integrated software-defined data center infrastructure. Agile, automated and available hybrid cloud Infrastructure provides consistent operations and lowers total cost of ownership. Run applications anywhere, and easily scale to meet growing data requirements. Advanced automation to rapidly deploy hybrid cloud, ease the burden on IT and improve efficiency. Automated day 0-2 life cycle management for software and hardware. An integrated SDDC solution powered by VMware Cloud Foundation to power all virtualized and containerized apps. Consistent Infrastructure Across Data Center and Public Cloud. True hybrid cloud infrastructure to run apps anywhere without rearchitecting. Choice of deploying workloads on hyperconverged infrastructure or SAN systems.
  • 14
    Pensando

    Pensando

    Pensando

    The massive expansion in the number and diversity of applications, as well as an explosion in the amount of data being generated and transported through enterprise data centers, has pushed the architectural limits of modern IT infrastructure to its breaking point. Traditional “scale-up” approaches, where infrastructure services are embedded into top-of-rack switches, networking and security appliances, are no longer able to keep up, making performance, agility and scale limitations a fact of life for many businesses. Pensando Systems was founded on the belief that there has to be a better way to address these complex issues. We have taken a ground up approach to build a platform that gives enterprises the unique ability to drive cloud-like agility, security and operational simplicity across their entire infrastructure with unmatched scale and performance.
  • 15
    QxStor
    Cloud native technology has been highlighted in modern cloud infrastructure design for its light weight and high portability. It also achieves efficient development and operation (DevOps), thereby facilitating agile service deployment and business innovation. To accelerate cloud-native transformation at minimized expenses, QCT validated the Red Hat® OpenShift Container Platform and Kubernetes Platform to ensure high-quality service and performance. QCT QxStack with Cloud-Native Platform is a Platform as a Service (PaaS) solution built on the Red Hat® OpenShift® Container Platform and strengthened by Intel Enhanced Platform Awareness (EPA) technology. The production-ready performance-optimized solution features a Hyper Converged Infrastructure (HCI) architecture that supports VMs and container coexistence and allows resource sharing. Furthermore, with exceptional network performance and stability, the solution achieves ideal CAPEX and OPEX in all stages of new technology implementation.
  • 16
    Mainsail

    Mainsail

    Tideworks Technology

    Mainsail optimizes system response times and offers a simple, cost effective means to deploy and run the terminal operating system. Seamlessly communicate between Mainsail and other business critical systems, such as accounting, gate and proprietary systems. Effectively manage your terminal with a library of standard reports as well as user-defined ad hoc reporting. Create customized reports and save for later use. Instantly find the information you need with more features accessible from a single screen. You can easily filter and sort data, drill-down into details, graph results, mass edit records and save searches and reports. The terminal controls which features it uses, as well as which users are able to view, add, edit and delete data on each screen. Individual users can set specific preferences to view and sort data the way they want to see it. Complete inventory management of containers, chassis, gensets, rolling stock, over-dimensional cargo, and hazardous materials.
  • 17
    Privafy

    Privafy

    Privafy

    Data security must adapt to this world of change by protecting data-in-motion as it moves across enterprises, communications service providers, and IoT devices. For telecommunications service providers, there is CarrierEdge. Built to help carriers deliver managed security services to their customers through the cloud, enabling rapid scalability through simple, flexible licensing models. CarrierEdge provides a complete, enterprise-class security stack that protects data-in-motion as it moves between the enterprise, the carrier network, and the cloud. For IoT device manufacturers, there is MicroEdge. Designed for rapid, simple integration into existing IoT chipsets, MicroEdge delivers embedded security capabilities for data-in-motion as it moves from devices through hybrid cloud environments, allowing IoT device manufacturers to provide data security assurance to their customers at a lower price per device.
  • 18
    Check Point Infinity
    Organizations frequently implement multiple cyber security solutions in pursuit of better protections. As a result, they are frequently left with a patchwork security architecture that results in a high TCO. By adopting a consolidated security approach with Check Point Infinity architecture, businesses realize preemptive protection against advanced fifth-generation attacks, while achieving a 50% increase in operational efficiency and 20% reduction in security costs. The first consolidated security architecture across networks, cloud, mobile and IoT, providing the highest level of threat prevention against both known and unknown cyber-threats. 64 different threat prevention engines blocking against known and unknown threats, powered by threat intelligence. Infinity-Vision is the unified management platform for Check Point Infinity, the first modern, consolidated cyber security architecture built to prevent today’s most sophisticated attacks across networks, cloud, endpoints, etc.
  • 19
    Check Point IPS

    Check Point IPS

    Check Point IPS

    Intrusion Prevention Systems detect or prevent attempts to exploit weaknesses in vulnerable systems or applications, protecting you in the race to exploit the latest breaking threat. Check Point IPS protections in our Next Generation Firewall are updated automatically. Whether the vulnerability was released years ago, or a few minutes ago, your organization is protected. Check Point IPS delivers thousands of signature and behavioral preemptive protections. Our acceleration technologies let you safely enable IPS. A low false positive rate saves your staff valuable time. Enable IPS on any Check Point security gateway reducing total cost of ownership. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely.
  • 20
    Itron Enterprise Meter Data Management
    Itron Enterprise Edition (IEE) Meter Data Management System (MDMS) is an industry-leading data management solution for residential gas, water and electric meters, C&I meters and IoT sensors. Our ever-evolving platform provides you with the flexibility, value and functionality needed regardless of your deployment size. For the larger IOU market, IEE MDMS is a highly scalable enterprise application that centralizes the collection, processing, storage and complex analysis of smart device data, device events and alarms. For the municipal and cooperative market, IEE Essentials provides you with the focused capabilities of our industry-leading IEE MDMS to address your needs without sacrificing features or capabilities of the standard IEE offering, all while delivering a cost-effective solution. IEE is the most globally deployed meter data management system in the world. Our installed base comprises over 100 customers across six continents with more than 45 million meters in production.
  • 21
    Inseego

    Inseego

    Inseego

    Give your customers the fastest, easiest, most reliable broadband solutions. Connect your enterprise to real-time IoT intelligence. Smart, secure IoT solutions, from the edge to the cloud to business intelligence. Reach new markets with new 5G applications. See how we can you help you develop and launch new 5G breakthroughs. Depend on Inseego for trusted, secure solutions. We’ve been helping first responders and government agencies for decades. Work, study, play and stay connected anywhere. Our modems and MiFi® mobile hotspots give you instant internet access almost anywhere you go, with a fast, secure 4G/5G connection and Wi-Fi for your laptops, tablets and other devices. Get blazing-fast 5G broadband for your home or business. Whether you’re ‘cutting the cord’ on cable or you live where wireline doesn’t reach, our fixed wireless access (FWA) solutions make it easy to bring high-speed broadband to your premises.
  • 22
    Strata Maverics Platform
    Identity integrations across all your clouds on one powerful platform. Strata’s Maverics Identity Orchestration Platform is the first distributed, multi-cloud identity solution. Maverics is an abstraction layer that integrates heterogeneous identity management systems to make many policies, APIs, and sessions work as one. Enterprise identity management is hard. Making identity work for multi-cloud doesn’t have to be. Enterprises are rapidly moving to distributed architectures. Whether a hybrid of on-premises and cloud, or several clouds, running distributed systems creates identity silos. Applications live on different clouds, like Microsoft Azure, AWS, and Google Cloud, and each cloud comes with its own identity system. Add the challenge of on-premises legacy apps, and you’ve got a distributed identity management problem. Maverics is a new approach to identity management for multi-cloud environments.
  • 23
    Acceptto Zero Trust Identity (CIAM)
    You need to know that your customers are who they say they are, customers don’t want to jump through hoops to prove it and they want you to keep their credentials safe. Protect your customers identities through a delicate balance of security and a frictionless, pleasant customer experience. Real-time, continuous identity monitoring & validation Post-Authorization. Eliminate account takeover (ATO) instantly with intelligent MFA. Risk-based policy orchestrated continuous authentication. Acceptto is a transformative cybersecurity company driving a paradigm shift in identity access management by treating authentication not as a single event, but rather a continuum. Our AI/ML powered Passwordless Continuous AuthenticationTM technology analyzes and verifies user identity, inferring behavioral data to detect anomalies and eliminate dependence on vulnerable binary authentications. We deliver the smartest, most resilient and breach-proof identity validation technology.
  • 24
    Caveonix

    Caveonix

    Caveonix

    Traditional enterprise security and compliance solutions tend to be unscalable within hybrid and multi-cloud environments. As other “cloud-native” solutions frequently leave existing data centers behind, it can be difficult for teams to secure their enterprise’s hybrid computing operating environments. From infrastructure and services to applications and workloads, your teams can confidently protect all your cloud environments. Created by industry veterans that know digital risk and compliance inside and out, Caveonix RiskForesight is a platform trusted by our customers and partners that provides proactive workload protection. Detect, Predict and Act on threats that occur in your technology stack and hybrid cloud environments. Automate your digital risk and compliance processes, and proactively protect your hybrid and multi-cloud environments. Implement cloud security posture management and cloud workload protection, as defined by Gartner's standards.
  • 25
    Fedora CoreOS

    Fedora CoreOS

    Fedora Project

    Fedora CoreOS is an automatically-updating, minimal operating system for running containerized workloads securely and at scale. It is currently available on multiple platforms, with more coming soon. There are three Fedora CoreOS (FCOS) update streams available: stable, testing, and next. In general, you will want to use stable, but it is recommended to run some machines on testing and next as well and provide feedback. For automating Fedora CoreOS installations, it is expected that you will interact with stream metadata. While Fedora CoreOS does automatic in-place updates, it is generally a good practice to start provisioning new machines from the latest images. Fedora CoreOS does not have a separate install disk. Instead, every instance starts from a generic disk image which is customized on first boot via Ignition. Everything included is open source and free software, not only is it available at no cost to you, but you can share, remix, and modify.
  • 26
    Netvisor ONE

    Netvisor ONE

    Pluribus Networks

    Moving to Open Networking bare metal switches brings significant operational and financial benefits to build next-generation networks. These switches provide the capacity needed to achieve cloud-scale, agility, elasticity, and adaptability. As you move to a disaggregated open networking strategy, selecting the right Network Operating System (OS) is a critical success factor. Why? The Network OS deployed unlocks the performance, functionality, and services from Open Networking switches to realize the most value. Netvisor® ONE is an open, secure, and programable next-generation Network OS that is purpose-built to optimize the power and performance of bare metal Open Networking hardware. Deployment-proven in production mission-critical enterprise and carrier networks, Netvisor ONE operating system meets the most stringent performance requirements and delivers the maximum levels of reliability and flexibility at scale, and without compromise.
  • 27
    UnixWare

    UnixWare

    Xinuos

    UnixWare® 7.1.4 is the latest release of Xinuos’s award winning, state of the art UNIX® operating system. It is the mature and proven operating system to support your most critical line of business applications, yet is affordably priced to host all computer needs. It supports the newest industry standard hardware platforms and peripherals and contains even more of the high performance, scalability and reliability features that you have come to expect from UnixWare. As an added bonus, the default configurations of the most popular editions have been adjusted to provide even more value for your money. New installations of UnixWare 7.1.4 as well as upgrades immediately benefit from the additional value in UnixWare 7.1.4. A new, low-entry-level edition has been added and is configured and priced for low budget pilot projects, edge of network services and line of business applications for small companies.
  • 28
    Flatcar Container Linux
    The introduction of container-based infrastructure was a paradigm shift. A Container-optimized Linux distribution is the best foundation for cloud native infrastructure. A minimal OS image only includes the tools needed to run containers. No package manager, no configuration drift. Delivering the OS on an immutable filesystem eliminates a whole category of security vulnerabilities. Automated atomic updates mean you get the latest security updates and open source technologies. Flatcar Container Linux is designed from the ground up for running container workloads. It fully embraces the container paradigm, including only what is required to run containers. Your immutable infrastructure deserves an immutable Linux OS. With Flatcar Container Linux, you manage your infrastructure, not your configuration.
  • 29
    WSO2 Enterprise Service Bus
    The WSO2 integration runtime engine is capable of playing multiple roles in your enterprise architecture. It can act as an ESB or a microservices integrator. When deployed as an ESB, it caters to your message routing, transformation, message mediation, service orchestration, as well as service and API hosting needs. Header-based, content-based, rule-based, and priority-based routing. Implement Enterprise Integration Patterns (EIPs), database integration, event stream integrations. Transform messages with XSLT 1.0/2.0, XPath, XQuery, and Smooks. Visual data mapping, CSV, JSON, and XML transformation connectors. Supports any RDBMS, CSV, Excel, ODS, Cassandra, and Google spreadsheets. Supports OData v4 protocol for any RDBMS and Cassandra data sources. Supports MSSQL, DB2, Oracle, OpenEdge, TerraData, MySQL, PostgreSQL/EnterpriseDB, H2, Derby or any database with a JDBC driver. Support for nested queries across data sources.
  • 30
    AppHelp

    AppHelp

    AppDirect

    Customers have different support needs at different stages of their digital journey. Become the trusted advisor to your customers with training solutions to help them adopt new services, or help them maximize their solutions with ongoing support. Offload your productivity support operations so you can focus on your core business for digital transformation. AppHelp offers a variety of migration, onboarding, and ongoing support solutions to help you meet and exceed requirements for both Microsoft and Google’s Cloud Partner Programs. Help your SMB customers save on on-site IT costs with a comprehensive Help Desk solution. Diagnose and troubleshoot issues from cloud applications to networking devices, computers, and more. Power the smart revolution for your business customers by offering holistic IoT solutions consisting of smart and connected devices, apps, and support. AppHelp offers remote support for security products, access control, A/V equipment, and more.