Best IT Management Software for Microsoft Hyper-V - Page 3

Compare the Top IT Management Software that integrates with Microsoft Hyper-V as of September 2024 - Page 3

This a list of IT Management software that integrates with Microsoft Hyper-V. Use the filters on the left to add additional filters for products that have integrations with Microsoft Hyper-V. View the products that work with Microsoft Hyper-V in the table below.

  • 1
    StarWind Virtual SAN (VSAN)
    StarWind VSAN has been designed with small businesses’ needs and restricted IT budgets in mind. It pulls out close to 100% of the IOPS from your existing raw storage —no crazy expensive hardware required. Licensing is flexible and transparent without any pitfalls or feature paywalls. Virtual SAN from StarWind ensures high uptime and fault tolerance starting with just two nodes. You don’t need a witness if you don’t want to have one. Your IT environment won’t skip a beat even if you lose an entire node plus one individual storage device, HDD or SSD. Scale up, down, or out when and how you need it. Operate your HCI clusters through a unified StarWind web UI. Our engineers will assist in migrating your existing workload to StarWind at no extra cost! Our solution has been specifically designed to bring enterprise-grade features to SMBs, which do not operate corporate budgets. StarWind VSAN requires no witnesses and brings all the promised benefits in a two-node scenario already.
  • 2
    UnixWare

    UnixWare

    Xinuos

    UnixWare® 7.1.4 is the latest release of Xinuos’s award winning, state of the art UNIX® operating system. It is the mature and proven operating system to support your most critical line of business applications, yet is affordably priced to host all computer needs. It supports the newest industry standard hardware platforms and peripherals and contains even more of the high performance, scalability and reliability features that you have come to expect from UnixWare. As an added bonus, the default configurations of the most popular editions have been adjusted to provide even more value for your money. New installations of UnixWare 7.1.4 as well as upgrades immediately benefit from the additional value in UnixWare 7.1.4. A new, low-entry-level edition has been added and is configured and priced for low budget pilot projects, edge of network services and line of business applications for small companies.
  • 3
    BT Diamond IP

    BT Diamond IP

    BT For Global Business

    Flexible, scalable, extensible IP address management products and managed services. Diamond IP is our IP address management (IPAM) solution which streamlines management of your entire IPv4 and IPv6 address lifecycle across your premises, branch remote, private and public cloud domains. We offer software, hardware and virtual appliance (private and public) products, as well as managed IPAM services. We facilitate multi-cloud IPAM with virtual appliances for AWS, Azure, Oracle VM, VMware, Hyper-V and others. And our cloud automation appliance dynamically automates the assignment and tracking of private and public cloud instance IP addresses and DNS names. Our DNS security products supplement your defense in depth security strategy at the DNS layer. We serve global multinational organizations around the world with our security, cloud and networking services. We can help your organization to move to the cloud; turn collaboration into part of your culture; improve your contact centres.
  • 4
    BlueCat Gateway
    Provide self-service capabilities to end users making IT more accessible across the enterprise. Access a robust automation library that facilitates complex automation tasks and integrates with 3rd party solutions to extend the value of existing solutions. Automate the stand-up and tear-down of cloud and on-premises resources, enabling IT to respond faster to requests. Extend visibility from the data center to the cloud through discovery and continuous synchronization of cloud-based IP and DNS-resources. Reduce time to remediate problems and shorten investigations by automating the reconciliation of IP addresses and DNS records. Accelerate application delivery and eliminate outages, with centralized management and integration with native DNS and IP configuration services in public clouds. Align custom network emergency plans with flexible control over manual or automated DNS failover.
  • 5
    Carbonite Migrate
    Carbonite Migrate allows you to easily migrate physical, virtual and cloud workloads to and from any environment with minimal risk and near-zero downtime. Options for finely tuned automation help orchestrate every stage of the process. Replicate data continuously to minimize downtime and enable fast cutover. Perform unlimited testing of the new environment without disrupting operations. Reduce downtime to minutes or seconds as you cut over to the new server. After installing Carbonite Migrate, the administrator selects the source and target servers through the console. The administrator chooses how to migrate data, with options from fully automated cloud orchestration workflows to DIY with our robust SDK. Offers freedom from lock-in to any specific hypervisor, cloud vendor or hardware. Cutting over to the target can be initiated manually or automated immediately upon completion of initial synchronization.
  • 6
    QANplatform

    QANplatform

    QANplatform

    Developers and enterprises can build Quantum-resistant smart-contracts, DApps, DeFi solutions, NFTs, tokens, Metaverse on top of the QAN blockchain platform in any programming language. QANplatform is the first Hyperpolyglot Smart Contract platform where developers can code in any programming language and also get rewarded for writing high-quality code reusable by others. The Quantum threat is very real. Existing chains can not defend against it. QAN is resistant against it from ground up, your future funds are safe. Quantum-resistant algorithms — also known as post-quantum, quantum-secure, or quantum-safe — are cryptographic algorithms that can fend off attacks from quantum computers. Quantum-resistant algorithms — also known as post-quantum, quantum-secure, or quantum-safe — are cryptographic algorithms that can fend off attacks from quantum computers.
  • 7
    Catalogic DPX

    Catalogic DPX

    Catalogic Software

    Reliable, rapid, and low-cost backup and recovery. Protect and recover your data from human errors, disasters, and ransomware attacks. Fast recovery-in-place from disk, tape and cloud. Agentless backup for virtual environments enhancements including single file recovery to restore specific files or directories from VMware and Microsoft Hyper-V agentless backups. Enhancements to vStor, our software-defined backup appliance, including appliance configuration via the HTML5 interface, replication management, and S3 Object Lock for protecting cloud backups against early deletion and ransomware. More cloud storage backup and archive targets including Backblaze B2 Cloud Storage with S3 Object Lock, and Amazon S3 Glacier and Glacier Deep Archive support.
  • 8
    Commvault Backup & Recovery
    Ensure data availability for all workloads across cloud and on-prem environments. Wherever your data resides, ensure availability via a single interface with Commvault® Backup & Recovery. Say goodbye to costly data loss scenarios, segregated data silos, missing recovery SLAs, and inefficient scaling. Empower your team to do more. Comprehensive workload coverage (files, apps, databases, virtual, containers, cloud) from a single extensible platform and user interface. Rapid, granular recovery of data and applications, including instant recovery of virtual machines. Easily back up, recover, and move data and workloads to/from/within/between clouds. High-performance backups via storage integrations. Built-in ransomware protection including anomaly detection and reporting. Reduce costs with minimal infrastructure requirements in the cloud or on-premises. Optimize cloud vs on-premises location of data and workloads via policy-driven automation.
  • 9
    PetaSAN

    PetaSAN

    PetaSAN

    PetaSAN is a scale-out active/active storage solution offering massive scalability and performance. PetaSAN uses modern cloud based technologies to provide the elasticity and agility to scale up the storage cluster simply by adding more nodes; this can be done at any time and in a truly non-disruptive manner. Although PetaSAN uses different underlying technologies that are inherently complex, it provides an integrated end to end solution that is very easy to install and operate. PetaSAN can be operated by non-Linux admins through its easy to use graphical interfaces while still allowing Linux experts full control if they wish. PetaSAN brings proven technologies powering many of today’s largest clouds to the datacenter with point and click interfaces. At the storage level PetaSAN relies on the Ceph storage engine. Ceph is the leading edge open source SDS cloud storage solution powering many of today’s private clouds and public clouds.
  • 10
    Unisys ClearPath Forward MCP
    For computing requirements that demand the utmost in security, resiliency, availability and scalability combined with optimal business agility, ClearPath Forward provides the foundation for simplification, controlling costs, and digital transformation. Augment staff, optimize performance and speed digital transformation of your ClearPath Forward environment with a managed service offering and cloud hosting managed, maintained and optimized by Unisys. Build a clear, actionable strategy that outlines how to evolve your applications in response to new demands with ClearPath Forward Advisory Services and ClearPath Forward Application Evolution Services. Benefit from a full range of advisory and implementation services to streamline the transition of your ClearPath Forward environment to private or public cloud.
  • 11
    Accops Digital Workspace
    The workspace has gone hybrid. A large segment of the workforce is working from home today, accessing business applications and data from various locations, using varied devices and in different ways. Thus, organizations all over the globe are looking for ways to transition from a hardware-based IT infrastructure into a completely software-defined infrastructure. They are trying to enable their workforce to be productive, secure, and seamless, regardless of their locations, or the devices and networks they use. But data security concerns, IT infrastructure complexities, and increased costs associated with setting up a digital work infrastructure pose many hurdles for organizations. Accops Digital Workspace provides a comprehensive, zero-trust-based end-user computing solution, enabling secure and instant access to business applications from anywhere, any device, and any network. The Accops solution suite includes end-user computing virtualization.
  • 12
    Accops HyWorks
    Accops HyWorks gives the modern-day professional, flexibility, and agility to work anywhere, anytime, and on any device, enhancing job satisfaction and engagement. This comprehensive product simplifies the way the IT team manages and secures apps, devices, and networks, to provide safe and seamless access to all the tools that employees need to perform at their best. And the centralized endpoint management makes it easy to control and manage all devices, virtual desktops, and applications from a central location. HyWorks not only helps you create a secure work environment but also reduces complexities, allowing your workforce to focus their creativity on core business activities, rather than worrying about system glitches, software updates, or cyber threats, thereby increasing productivity and reducing costs. Control every device, app & OS in your network to prevent security breaches, by virtualizing & delivering desktop apps from the centralized datacenter.
  • 13
    Barracuda Intronis Backup

    Barracuda Intronis Backup

    Barracuda Networks

    Barracuda Intronis Backup – MSP is a software-only BDR solution designed to offer value to your customers by protecting what matters most, while creating new opportunities to expand your margins and grow your business. Intronis Backup and the ECHOplatform is a software-only solution that goes beyond file-and-folder and delivers secure hybrid local and cloud backup services that offer flexible, comprehensive data protection — complemented by a simple pricing structure and a centralized management portal. Intronis Backup is available at a fixed cost per SMB site, creating cost certainty for MSPs. Fixed pricing also makes it easier for MSPs to build margins and makes data protection a growth driver. Intronis Backup includes management and reporting tools you need to support SMBs effectively. And you can maximize your efficiency thanks to our tight integrations with core MSP business tools.
  • 14
    Asigra Tigris Backup
    Asigra Tigris protects your backups from today’s new breed of attacks, improving your odds of data recovery while being easier to manage than traditional backup software. With a unique network-based data security architecture, Asigra provides inline advanced antimalware, encryption, authentication, and obfuscation features to do what traditional backup software can’t do. Protect your backup data from determined attackers so you avoid paying ransoms. Asigra deploys to the network quickly, without requiring endpoint agents, enabling smoother updates, reduced administration, and a minimized security footprint. Whether you are recovering last night's file for a user or your entire data center, you can be confident that your restores will succeed with advanced recovery capabilities. Incremental forever lets you restore backups from any point in time. Autonomic healing repairs corrupted backups automatically.