Alternatives to Clonetab
Compare Clonetab alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Clonetab in 2024. Compare features, ratings, user reviews, pricing, and more from Clonetab competitors and alternatives in order to make an informed decision for your business.
-
1
Google Compute Engine
Google
Compute Engine is Google's infrastructure as a service (IaaS) platform for organizations to create and run cloud-based virtual machines. Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications. Integrate Compute with other Google Cloud services such as AI/ML and data analytics. Make reservations to help ensure your applications have the capacity they need as they scale. Save money just for running Compute with sustained-use discounts, and achieve greater savings when you use committed-use discounts. -
2
Parallels RAS
Parallels
Parallels® Remote Application Server (RAS) is a remote work solution that provides secure virtual access to business applications and desktops on any device or OS—from anywhere. The platform offers an agile, cloud-ready foundation and end-to-end security fueled by a centralized management console with granular policies. Companies can leverage on-premises, hybrid, or public cloud deployments and integrate with existing technology like Microsoft Azure and AWS. Parallels RAS aims to give organizations the flexibility, scalability, and IT agility to adapt to changing business needs. Parallels RAS offers a single, full-featured licensing model that includes 24/7 support and access to product training. -
3
Windocks
Windocks
Windocks is a leader in cloud native database DevOps, recognized by Gartner as a Cool Vendor, and as an innovator by Bloor research in Test Data Management. Novartis, DriveTime, American Family Insurance, and other enterprises rely on Windocks for on-demand database environments for development, testing, and DevOps. Windocks software is easily downloaded for evaluation on standard Linux and Windows servers, for use on-premises or cloud, and for data delivery of SQL Server, Oracle, PostgreSQL, and MySQL to Docker containers or conventional database instances. Windocks database orchestration allows for code-free end to end automated delivery. This includes masking, synthetic data, Git operations and access controls, as well as secrets management. Windocks can be installed on standard Linux or Windows servers in minutes. It can also run on any public cloud infrastructure or on-premise infrastructure. One VM can host up 50 concurrent database environments. -
4
Titaniam
Titaniam
Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022. -
5
DATPROF
DATPROF
Test Data Management solutions like data masking, synthetic data generation, data subsetting, data discovery, database virtualization, data automation are our core business. We see and understand the struggles of software development teams with test data. Personally Identifiable Information? Too large environments? Long waiting times for a test data refresh? We envision to solve these issues: - Obfuscating, generating or masking databases and flat files; - Extracting or filtering specific data content with data subsetting; - Discovering, profiling and analysing solutions for understanding your test data, - Automating, integrating and orchestrating test data provisioning into your CI/CD pipelines and - Cloning, snapshotting and timetraveling throug your test data with database virtualization. We improve and innovate our test data software with the latest technologies every single day to support medium to large size organizations in their Test Data Management. -
6
IRI FieldShield
IRI, The CoSort Company
IRI FieldShield® is powerful and affordable data discovery and masking software for PII in structured and semi-structured sources, big and small. Use FieldShield utilities in Eclipse to profile, search and mask data at rest (static data masking), and the FieldShield SDK to mask (or unmask) data in motion (dynamic data masking). Classify PII centrally, find it globally, and mask it consistently. Preserve realism and referential integrity via encryption, pseudonymization, redaction, and other rules for production and test environments. Delete, deliver, or anonymize data subject to DPA, FERPA, GDPR, GLBA, HIPAA, PCI, POPI, SOX, etc. Verify compliance via human- and machine-readable search reports, job audit logs, and re-identification risk scores. Optionally mask data as you map it. Apply FieldShield functions in IRI Voracity ETL, federation, migration, replication, subsetting, or analytic jobs. Or, run FieldShield from Actifio, Commvault or Windocks to mask DB clones.Starting Price: Varies by component/scope -
7
Delphix
Delphix
Delphix is the industry leader in DataOps and provides an intelligent data platform that accelerates digital transformation for leading companies around the world. The Delphix DataOps Platform supports a broad spectrum of systems, from mainframes to Oracle databases, ERP applications, and Kubernetes containers. Delphix supports a comprehensive range of data operations to enable modern CI/CD workflows and automates data compliance for privacy regulations, including GDPR, CCPA, and the New York Privacy Act. In addition, Delphix helps companies sync data from private to public clouds, accelerating cloud migrations, customer experience transformation, and the adoption of disruptive AI technologies. Automate data for fast, quality software releases, cloud adoption, and legacy modernization. Source data from mainframe to cloud-native apps across SaaS, private, and public clouds. -
8
Actifio
Google
Automate self-service provisioning and refresh of enterprise workloads, integrate with existing toolchain. High-performance data delivery and re-use for data scientists through a rich set of APIs and automation. Recover any data across any cloud from any point in time – at the same time – at scale, beyond legacy solutions. Minimize the business impact of ransomware / cyber attacks by recovering quickly with immutable backups. Unified platform to better protect, secure, retain, govern, or recover your data on-premises or in the cloud. Actifio’s patented software platform turns data silos into data pipelines. Virtual Data Pipeline (VDP) delivers full-stack data management — on-premises, hybrid or multi-cloud – from rich application integration, SLA-based orchestration, flexible data movement, and data immutability and security. -
9
Orbit Analytics
Orbit Analytics
Empower your business by leveraging a true self-service reporting and analytics platform. Powerful and scalable, Orbit’s operational reporting and business intelligence software enables users to create their own analytics and reports. Orbit Reporting + Analytics offers pre-built integration with enterprise resource planning (ERP) and key cloud business applications that include PeopleSoft, Oracle E-Business Suite, Salesforce, Taleo, and more. With Orbit, you can quickly and efficiently find answers from any data source, determine opportunities, and make smart, data-driven decisions. Orbit comes with more than 200 integrators and connectors that allow you to combine data from multiple data sources, so you can harness the power of collective knowledge to make informed decisions. Orbit Adapters connect with your key business systems, and designed to seamlessly inherit authentication, data security, business roles and apply them to reporting. -
10
Oracle VM
Oracle
Designed for efficiency and optimized for performance, Oracle's server virtualization products support x86 and SPARC architectures and a variety of workloads such as Linux, Windows and Oracle Solaris. In addition to solutions that are hypervisor-based, Oracle also offers virtualization built in to hardware and Oracle operating systems to deliver the most complete and optimized solution for your entire computing environment. -
11
Accelario
Accelario
Take the load off of DevOps and eliminate privacy concerns by giving your teams full data autonomy and independence via an easy-to-use self-service portal. Simplify access, eliminate data roadblocks and speed up provisioning for dev, testing, data analysts and more. Accelario Continuous DataOps Platform is a one-stop-shop for handling all of your data needs. Eliminate DevOps bottlenecks and give your teams the high-quality, privacy-compliant data they need. The platform’s four distinct modules are available as stand-alone solutions or as a holistic, comprehensive DataOps management platform. Existing data provisioning solutions can’t keep up with agile demands for continuous, independent access to fresh, privacy-compliant data in autonomous environments. Teams can meet agile demands for fast, frequent deliveries with a comprehensive, one-stop-shop for self-provisioning privacy-compliant high-quality data in their very own environments.Starting Price: $0 Free Forever Up to 10GB -
12
CONNX
Software AG
Unlock the value of your data—wherever it resides. To become data-driven, you need to leverage all the information in your enterprise across apps, clouds and systems. With the CONNX data integration solution, you can easily access, virtualize and move your data—wherever it is, however it’s structured—without changing your core systems. Get your information where it needs to be to better serve your organization, customers, partners and suppliers. Connect and transform legacy data sources from transactional databases to big data or data warehouses such as Hadoop®, AWS and Azure®. Or move legacy to the cloud for scalability, such as MySQL to Microsoft® Azure® SQL Database, SQL Server® to Amazon REDSHIFT®, or OpenVMS® Rdb to Teradata®. -
13
Querona
YouNeedIT
We make BI & Big Data analytics work easier and faster. Our goal is to empower business users and make always-busy business and heavily loaded BI specialists less dependent on each other when solving data-driven business problems. If you have ever experienced a lack of data you needed, time to consuming report generation or long queue to your BI expert, consider Querona. Querona uses a built-in Big Data engine to handle growing data volumes. Repeatable queries can be cached or calculated in advance. Optimization needs less effort as Querona automatically suggests query improvements. Querona empowers business analysts and data scientists by putting self-service in their hands. They can easily discover and prototype data models, add new data sources, experiment with query optimization and dig in raw data. Less IT is needed. Now users can get live data no matter where it is stored. If databases are too busy to be queried live, Querona will cache the data. -
14
TIBCO Data Virtualization
TIBCO Software
An enterprise data virtualization solution that orchestrates access to multiple and varied data sources and delivers the datasets and IT-curated data services foundation for nearly any solution. As a modern data layer, the TIBCO® Data Virtualization system addresses the evolving needs of companies with maturing architectures. Remove bottlenecks and enable consistency and reuse by providing all data, on demand, in a single logical layer that is governed, secure, and serves a diverse community of users. Immediate access to all data helps you develop actionable insights and act on them in real time. Users are empowered because they can easily search for and select from a self-service directory of virtualized business data and then use their favorite analytics tools to obtain results. They can spend more time analyzing data, less time searching for it. -
15
Hyper-Q
Datometry
Adaptive Data Virtualization™ technology enables enterprises to run their existing applications on modern cloud data warehouses, without rewriting or reconfiguring them. Datometry Hyper-Q™ lets enterprises adopt new cloud databases rapidly, control ongoing operating expenses, and build out analytic capabilities for faster digital transformation. Datometry Hyper-Q virtualization software allows any existing applications to run on any cloud database, making applications and databases interoperable. Enterprises can now adopt the cloud database of choice, without having to rip, rewrite and replace applications. Enables runtime application compatibility with Transformation and Emulation of legacy data warehouse functions. Deploys transparently on Azure, AWS, and GCP clouds. Applications can use existing JDBC, ODBC and Native connectors without changes. Connects to major cloud data warehouses, Azure Synapse Analytics, AWS Redshift, and Google BigQuery. -
16
Redgate Deploy
Redgate Software
Standardize deployments for SQL Server, Oracle, and 18 other databases Increase frequency and reliability of database deployments Flexible toolchain for easy adoption across teams Catch errors and speed up development with Continuous Integration Get oversight of every change to your databases. From version control to continuous delivery, Redgate Deploy lets your teams automate database development processes so you can accelerate software delivery and ensure quality code. Building on your continuous delivery process for applications, and incorporating Redgate’s industry-leading tools and Flyway migrations framework, Redgate Deploy extends DevOps to your databases. Automate your deployments for faster delivery of database changes through your pipeline. To guarantee quality and consistency, Redgate Deploy provides repeatable processes that you can standardize on at every stage, from version control to live deployment.Starting Price: $2,499 per user per year -
17
SQL Secure
IDERA, an Idera, Inc. company
SQL Secure helps database administrators to manage SQL Server security in physical, virtual, and cloud environments - including managed cloud databases. Unlike its competition, it provides configurable data collection, customizable templates to satisfy audits for multiple regulatory guidelines, extensive security checks and audit rules, automated server registration process, and server group tagging.Starting Price: $1,036 per instance -
18
Presto
Presto Foundation
Presto is an open source distributed SQL query engine for running interactive analytic queries against data sources of all sizes ranging from gigabytes to petabytes. For data engineers who struggle with managing multiple query languages and interfaces to siloed databases and storage, Presto is the fast and reliable engine that provides one simple ANSI SQL interface for all your data analytics and your open lakehouse. Different engines for different workloads means you will have to re-platform down the road. With Presto, you get 1 familar ANSI SQL language and 1 engine for your data analytics so you don't need to graduate to another lakehouse engine. Presto can be used for interactive and batch workloads, small and large amounts of data, and scales from a few to thousands of users. Presto gives you one simple ANSI SQL interface for all of your data in various siloed data systems, helping you join your data ecosystem together. -
19
Denodo
Denodo Technologies
The core technology to enable modern data integration and data management solutions. Quickly connect disparate structured and unstructured sources. Catalog your entire data ecosystem. Data stays in the sources and it is accessed on demand, with no need to create another copy. Build data models that suit the needs of the consumer, even across multiple sources. Hide the complexity of your back-end technologies from the end users. The virtual model can be secured and consumed using standard SQL and other formats like REST, SOAP and OData. Easy access to all types of data. Full data integration and data modeling capabilities. Active Data Catalog and self-service capabilities for data & metadata discovery and data preparation. Full data security and data governance capabilities. Fast intelligent execution of data queries. Real-time data delivery in any format. Ability to create data marketplaces. Decoupling of business applications from data systems to facilitate data-driven strategies. -
20
Solix EDMS
Solix Technologies
The Solix Enterprise Data Management Suite (Solix EDMS) brings together all the tools for an effective Information Lifecycle Management (ILM) program. From a single web-based console, the platform offers industry-leading database archiving, test data management, data masking, and application retirement solutions. Solix EDMS is designed to control costs, boost application performance and availability, and meet compliance objectives. It offers universal access to all archived data for business users through full-text search, structured SQL queries, forms & reports. Solix EDMS helps you quickly identify infrequently accessed historic data from your production applications, and ‘move’ it to a secure archive with data integrity and access preserved. Retention management holds the archived data for a given period of time, and purges the data automatically, or manually when the data retention policy meets its criteria. -
21
K2View
K2View
At K2View, we believe that every enterprise should be able to leverage its data to become as disruptive and agile as the best companies in its industry. We make this possible through our patented Data Product Platform, which creates and manages a complete and compliant dataset for every business entity – on demand, and in real time. The dataset is always in sync with its underlying sources, adapts to changes in the source structures, and is instantly accessible to any authorized data consumer. Data Product Platform fuels many operational use cases, including customer 360, data masking and tokenization, test data management, data migration, legacy application modernization, data pipelining and more – to deliver business outcomes in less than half the time, and at half the cost, of any other alternative. The platform inherently supports modern data architectures – data mesh, data fabric, and data hub – and deploys in cloud, on-premise, or hybrid environments. -
22
Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Security Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
-
23
Wizuda
Wizuda
Powerful Solutions to revolutionize how your organization shares data internally and externally. Designed with security, compliance and efficiency at its core, Wizuda MFT enables IT to manage the movement of critical data within your organization and with external parties, from one centralized solution. Wizuda MFT scales with your business and provides full end-to-end accountability of all file transfer operations. Provide people in your organization and clients with an easy, secure and compliant way to share sensitive data. With no file size limitations and encryption by default, using insecure alternatives such as USBs can be a thing of the past. Users have the added flexibility of sending emails with Wizuda either straight from their Outlook email or the secure web portal. Wizuda Virtual Data Rooms provide your business with a secure online repository for document storage, collaboration and distribution. Built with ‘privacy by design’, Wizuda VDRs can be set up in minutes.Starting Price: $9.99/month/user -
24
IRI Data Protector Suite
IRI, The CoSort Company
The IRI Data Protector suite contains multiple data masking products which can be licensed standalone or in a discounted bundle to profile, classify, search, mask, and audit PII and other sensitive information in structured, semi-structured, and unstructured data sources. Apply their many masking functions consistently for referential integrity: IRI FieldShield® Structured Data Masking FieldShield classifies, finds, de-identifies, risk-scores, and audits PII in databases, flat files, JSON, etc. IRI DarkShield® Semi & Unstructured Data Masking DarkShield classifies, finds, and deletes PII in text, pdf, Parquet, C/BLOBs, MS documents, logs, NoSQL DBs, images, and faces. IRI CellShield® Excel® Data Masking CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in the cloud. IRI Data Masking as a Service IRI DMaaS engineers in the US and abroad do the work of classifying, finding, masking, and risk-scoring PII for you. -
25
Oracle Big Data SQL Cloud Service enables organizations to immediately analyze data across Apache Hadoop, NoSQL and Oracle Database leveraging their existing SQL skills, security policies and applications with extreme performance. From simplifying data science efforts to unlocking data lakes, Big Data SQL makes the benefits of Big Data available to the largest group of end users possible. Big Data SQL gives users a single location to catalog and secure data in Hadoop and NoSQL systems, Oracle Database. Seamless metadata integration and queries which join data from Oracle Database with data from Hadoop and NoSQL databases. Utilities and conversion routines support automatic mappings from metadata stored in HCatalog (or the Hive Metastore) to Oracle Tables. Enhanced access parameters give administrators the flexibility to control column mapping and data access behavior. Multiple cluster support enables one Oracle Database to query multiple Hadoop clusters and/or NoSQL systems.
-
26
Oracle Big Data Preparation
Oracle
Oracle Big Data Preparation Cloud Service is a managed Platform as a Service (PaaS) cloud-based offering that enables you to rapidly ingest, repair, enrich, and publish large data sets with end-to-end visibility in an interactive environment. You can integrate your data with other Oracle Cloud Services, such as Oracle Business Intelligence Cloud Service, for down-stream analysis. Profile metrics and visualizations are important features of Oracle Big Data Preparation Cloud Service. When a data set is ingested, you have visual access to the profile results and summary of each column that was profiled, and the results of duplicate entity analysis completed on your entire data set. Visualize governance tasks on the service Home page with easily understood runtime metrics, data health reports, and alerts. Keep track of your transforms and ensure that files are processed correctly. See the entire data pipeline, from ingestion to enrichment and publishing. -
27
Red Hat JBoss Data Virtualization is a lean, virtual data integration solution that unlocks trapped data and delivers it as easily consumable, unified, and actionable information. Red Hat JBoss Data Virtualization makes data spread across physically diverse systems, such as multiple databases, XML files, and Hadoop systems, appear as a set of tables in a local database. Provides standards-based read/write access to heterogeneous data stores in real-time. Speeds application development and integration by simplifying access to distributed data. Integrate and transform data semantics based on data consumer requirements. Provides centralized access control, and auditing through robust security infrastructure. Turn fragmented data into actionable information at the speed your business needs. Red Hat offers support and maintenance over stated time periods for the major versions of JBoss products.
-
28
Set up cloud environments quickly for ad hoc development, testing and productivity for your IT and business users. Reduce the risks and costs of maintaining your data lake by implementing comprehensive data governance, including end-to-end data lineage, for business users. Improve cost savings by delivering clean, consistent and timely information for your data lakes, data warehouses or big data projects, while consolidating applications and retiring outdated databases. Take advantage of automatic schema propagation to speed up job generation, type-ahead search, and backwards capability, while designing once and executing anywhere. Create data integration flows and enforce data governance and quality rules with a cognitive design that recognizes and suggests usage patterns. Improve visibility and information governance by enabling complete, authoritative views of information with proof of lineage and quality.Starting Price: $16,500 per month
-
29
Dremio
Dremio
Dremio delivers lightning-fast queries and a self-service semantic layer directly on your data lake storage. No moving data to proprietary data warehouses, no cubes, no aggregation tables or extracts. Just flexibility and control for data architects, and self-service for data consumers. Dremio technologies like Data Reflections, Columnar Cloud Cache (C3) and Predictive Pipelining work alongside Apache Arrow to make queries on your data lake storage very, very fast. An abstraction layer enables IT to apply security and business meaning, while enabling analysts and data scientists to explore data and derive new virtual datasets. Dremio’s semantic layer is an integrated, searchable catalog that indexes all of your metadata, so business users can easily make sense of your data. Virtual datasets and spaces make up the semantic layer, and are all indexed and searchable. -
30
AtScale
AtScale
AtScale helps accelerate and simplify business intelligence resulting in faster time-to-insight, better business decisions, and more ROI on your Cloud analytics investment. Eliminate repetitive data engineering tasks like curating, maintaining and delivering data for analysis. Define business definitions in one location to ensure consistent KPI reporting across BI tools. Accelerate time to insight from data while efficiently managing cloud compute costs. Leverage existing data security policies for data analytics no matter where data resides. AtScale’s Insights workbooks and models let you perform Cloud OLAP multidimensional analysis on data sets from multiple providers – with no data prep or data engineering required. We provide built-in easy to use dimensions and measures to help you quickly derive insights that you can use for business decisions. -
31
IBM DataStage
IBM
Accelerate AI innovation with cloud-native data integration on IBM Cloud Pak for data. AI-powered data integration, anywhere. Your AI and analytics are only as good as the data that fuels them. With a modern container-based architecture, IBM® DataStage® for IBM Cloud Pak® for Data delivers that high-quality data. It combines industry-leading data integration with DataOps, governance and analytics on a single data and AI platform. Automation accelerates administrative tasks to help reduce TCO. AI-based design accelerators and out-of-the-box integration with DataOps and data science services speed AI innovation. Parallelism and multicloud integration let you deliver trusted data at scale across hybrid or multicloud environments. Manage the data and analytics lifecycle on the IBM Cloud Pak for Data platform. Services include data science, event messaging, data virtualization and data warehousing. Parallel engine and automated load balancing. -
32
V-locity
Condusiv Technologies
Throughput acceleration software for virtual servers - boosts Windows application performance at least 30%. Guaranteed to solve your toughest application performance challenges on I/O intensive systems, like MS-SQL! V-locity eliminates the two big I/O inefficiencies in a virtual environment that generate a minimum of 30-40% I/O traffic that is nothing but mere noise dampening performance and unnecessarily chewing up precious storage IOPS. Not only can you expect an immediate boost and reclaim 30-40% of your storage IOPS, but many offload upwards of 50% of I/O traffic from storage for big performance gains in the 2X-10X range, by simply allocating a little extra memory on key systems to better leverage V-locity for an even bigger benefit on MS-SQL workloads, Oracle, ERP, VDI, EHR (MEDITECH), Business Intelligence (BI) apps, CRM, Exchange, SharePoint, file servers, backup, and more. Just download and install - no reboot required! Watch Performance return and shadow IT problems disappear!Starting Price: $524.95 -
33
Hive Fabric
HiveIO
HiveIO Delivers the Most Advanced Virtualization Platform for VDI. Period. The only solution to deliver an entire Virtual Desktop Infrastructure, tightly integrated into a single product. For many organizations considering VDI, Microsoft’s Windows Virtual Desktop seems like a great option at first glance. However, there are several questions you should ask before making a quick decision. This whitepaper will explore several key considerations when determining if WVD is the best choice for your team. HiveIO’s free community edition is intelligent virtualization software that give you the ability to create 5 virtual machines on a single host. See how Hive Fabric enables your remote workforce in a secure fashion -- at a fraction of the cost of other VDI options. Using swarm theory, intelligently utilize resources and scale your infrastructure. -
34
CloudDesk
CloudDesk
CloudDesk offers an end-to-end suite of products to deploy our Next-Gen Virtual Workspace solution with the objective of helping clients build new levels of user experience and business values through enhancing your IT agility. A software to create PC lab maps and schedules, and allows end-users to view resources availability in various locations (campuses, offices) and conveniently book desktop and release resrouces through a web portal. A web portal that allows end-users to create, configure and provision their own desktop and resources, and login to access any of their personal desktop anytime, anywhere. A unique client-based processing virtualization platform for streaming desktop and enables users to access desktop offline. An application virtualization software which streams applicaitons to desktop that eliminates compatibility issues. A lightweight server-based processing VDI platform that allows pooled or personalized virutal desktop. -
35
The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.Starting Price: $230 one-time payment
-
36
vSpace
NComputing
You have a room or office full of people who all need computers. You could buy them, but that’s expensive and boring, at least until they start having issues. Then they’re expensive and frustrating. The smarter approach is to simplify what you deploy and save a bunch of time, money and effort. So you buy a server and install vSpace Pro Enterprise Edition. It’s replacing all those computers and hosts your virtualized desktops, probably in another room where you can’t see or hear it. You give each of your users a keyboard, mouse and monitor, then plug them into an NComputing access device like the RX300. Connect to your network via LAN or WIFI, and now each of your people have their own virtual computer with support for the latest Windows operating systems. Rejoice, the user data is on the server and easily backed-up. The applications and operating system are as well, so you are maintaining just one server instead of an army of computers. -
37
CrossOver
CodeWeavers
Lots of people talk about open source. Talk is cheap. We code. Run your Windows® app on MacOS, Linux, or ChromeOS. CrossOver Mac® Do you like buying Windows® licenses? You do? Great. You do you. For the rest of humanity, CrossOver is the easiest way to run many Microsoft applications on your Mac without a clunky Windows emulator. (Seriously, have you tried emulators? Do you like how they run on your Mac?) CrossOver works differently. It's not an emulator. It does the work of translating Windows commands into Mac commands so that you can run Windows software as if it were designed native to Mac. CrossOver works with all kinds of software - productivity software, utility programs, and games - all with one application. CrossOver Linux® You are the noble of the noblest running Linux. You don't want the despair of running a Windows OS on your finely minted machine. You don't want to sell your soul for a Windows license or squander away your hard drive shekels running a virtual machineStarting Price: $59.95 -
38
Workspot
Workspot
Forget everything you know about VDI. Workspot’s turnkey, SaaS cloud PC platform gives IT teams the ability to easily deploy and manage virtual desktops, GPU workstations and applications around the globe, with performance users love. Enable your users to access their cloud desktop from any device, anywhere with our enterprise cloud PC platform. Easily integrate with your custom Windows 10 images, applications, security stack and processes to streamline how you work. Receive predictable, flat-rate pricing that includes cloud compute and let Workspot take on your desktop SLA. Deliver all-day performance and make users happy by delivering low-latency, cloud PCs from any Microsoft Azure or Google Cloud region. The ultimate in GPU-powered performance for designers and engineers using graphics-intensive apps. Deliver just the right enterprise apps to suit each end user’s role. -
39
Oracle Advanced Security
Oracle
Encrypt application tablespaces to prevent out-of-band access to sensitive data using Oracle Advanced Security. Redaction policies prevent the proliferation of sensitive data and aid in compliance with data protection regulations. Transparent Data Encryption (TDE) stops would-be attackers from bypassing the database and reading sensitive information directly from storage by enforcing data-at-rest encryption in the database layer. Encrypt individual data columns, entire tablespaces, database exports, and backups to control access to sensitive data. Data Redaction complements TDE by reducing the risk of unauthorized data exposure in applications, redacting sensitive data before it leaves the database. Partial or full redaction prevents large-scale extraction of sensitive data into reports and spreadsheets. Encryption is implemented at the database kernel level, eliminating the need for any changes to applications. -
40
Rubrik
Rubrik
A logical air gap prevents attackers from discovering your backups while our append-only file system ensures backup data can't be encrypted. You can keep unauthorized users out with globally-enforced multi-factor authentication. From backup frequency and retention to replication and archival, replace hundreds or thousands of backup jobs with just a few policies. Apply the same policies to all your workloads across on-premises and cloud. Archive your data to your public cloud provider’s blob storage service. Quickly access archived data with real-time predictive search. Search across your entire environment, down to the file level, and select the right point in time to recover. Reduce recovery time from days and weeks to hours or less. Rubrik and Microsoft have joined forces to help you build a cyber-resilient business. Reduce the risk of backup data breach, loss, or theft by storing immutable copies of your data in a Rubrik-hosted cloud environment, isolated from your core workloads. -
41
Cohesity
Cohesity
Simplify your data protection by eliminating legacy backup silos. Efficiently protect virtual, physical and cloud workloads, and ensure instant recovery. Bring compute to your data and run apps to gain insights. Protect your business from sophisticated ransomware attacks with a multilayered data security architecture. We don't need more single-purpose tools for all those silos. This patchwork leaves us more vulnerable to ransomware. Cohesity increases cyber resiliency and solves mass data fragmentation by consolidating data onto one hyper-scale platform. Modernize your data centers by consolidating backups, archives, file shares, object stores, and data used in analytics and dev/test. Our modern approach to solving these challenges is Cohesity Helios, a single next-gen data management platform that offers multiple services. Next-gen data management makes things easy to manage while keeping pace with your data growth. -
42
Hedvig Distributed Storage Platform
Commvault
Infrastructure on your terms. That is the Hedvig Distributed Storage Platform™. Tailor your storage environment to your application and data demands through a software-defined storage platform. Built on industry-standard x86 servers, the platform provides the multi-protocol support you require across block, file, and object storage with native application, hypervisor, container and cloud integration to consolidate your storage silos – eliminating your data fragmentation issues. Stop the data infrastructure fragmentation. Software-defined storage (SDS) provides modern infrastructure for your modern data center that is predictable, resilient and simple. Most enterprises have a mix of on-premises infrastructure and public cloud(s). This requires supporting multiple applications and hypervisors to move VMs from on-premises to the cloud. You’d also like to speed up provisioning to simplify managing VMs throughout their lifecycle. -
43
Randtronics DPM easyCipher
Randtronics
Randronics DPM easyCipher providers Transparent Data Encryption (TDE) lock-box protection to files, folders, and databases. Protection is transparent as contents are automatically decrypted for authorized users. Like a lock-box, TDE-protected objects are either locked or unlocked. DPM easyCipher is a centrally managed, policy-based encryption management solution that allows an organization to standardize its encryption protection by defining and managing encryption policies and applying these policies to any server or laptop where a DPM easyCipher agent has been installed. DPM easyCipher protects all files and folders on servers or laptops. Server environments protected by DPM easyCipher include database servers, web/app servers, and file servers. DPM easyCipher can either extend or replace database-native TDE solutions provided by database vendors to secure their own DB products. Use easyCipher to protect information residing outside of the database. -
44
Assure Security
Precisely
Assure Compliance Monitoring is a bundle of Assure Security features. Together, they can quickly identify security and compliance issues by producing alerts and reports on IBM i system activity, database changes and views of Db2 data. The bundle includes two features which are also available separately. Assure Monitoring and Reporting seamlessly extracts insights from IBM i journal data and delivers alerts and reports on security incidents and compliance deviations. System and database monitoring capabilities are available separately or together. Or, choose to send data directly to your enterprise SIEM solution allowing IBM i security to be monitored with all other enterprise platforms. Assure Db2 Data Monitor is a unique, innovative solution that monitors views of highly confidential Db2 data and optionally blocks records from view. Assure Security delivers market-leading IBM i security capabilities that help your organization successfully comply with cybersecurity regulations. -
45
DOT Anonymizer
DOT Anonymizer
Mask your personal data while ensuring it looks and acts like real data. Software development needs realistic test data. DOT Anonymizer masks your test data while ensuring its consistency, across all your data sources and DBMS. The use of personal or identifying data outside of production (development, testing, training, BI, external service providers, etc.) carries a major risk of data leak. Increasing regulations across the world require companies to anonymize/pseudonymize personal or identifying data. Anonymization enables you to retain the original data format. Your teams work with fictional but realistic data. Manage all your data sources and maintain their usability. Invoke DOT Anonymizer functions from your own applications. Consistency of anonymizations across all DBMS and platforms. Preserve relations between tables to guarantee realistic data. Anonymize all database types and files like CSV, XML, JSON, etc.Starting Price: €488 per month -
46
Randtronics DPM easyData
Randtronics
DPM easyData is a high-performance data spoofing or de-identification engine. Data spoofing examples include masking, tokenization, anonymization, pseudonymization and encryption. DPM data spoofing processes replace whole or parts of sensitive data with a non-sensitive equivalent (creates fake data) and is a very powerful data protection tool. DPM easyData is a software data security solution that allows web and app server applications and databases to tokenize and anonymize data and apply masking policies for unauthorized users when retrieving sensitive data. The software allows a high level of granularity, defining which authorized users have access to which protection policies, and what operations they may perform with those protection policies. DPM easyData is extremely customizable and is able to protect and tokenize many different types of data. The software has been designed to be flexible and users are free to define any format of input data and token format. -
47
IRI DarkShield
IRI, The CoSort Company
IRI DarkShield is a powerful data masking tool that can (simultaneously) find and anonymize Personally Identifiable Information (PII) "hidden" in semi-structured and unstructured files and database columns / collections. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it finds in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF DarkShield is one of 3 data masking products in the IRI Data Protector Suite, and comes with IRI Voracity data management platform subscriptions. DarkShield bridges the gap between structured and unstructured data masking, allowing users to secure data in a consistent manner across disparate silos and formats by using the same masking functions as FieldShield and CellShield EE. DarkShield also handles data in RDBs and flat-files, too, but there are more capabilities that FieldShield offers for those sources.Starting Price: 5000 -
48
ClearProcess
ClearProcess
APIs configured in our ClearProcess editor enable automation ranging from a single-step task to an end-to-end business process that may involve hundreds of tasks. Automations configured in ClearProcess can be triggered by human workers, voice commands, text messages, emails, and many other methods. ClearProcess acts as a centralized hub for all of your automation technologies, enabling you to orchestrate powerful automation that drives incredible productivity gains. Configure automation that survives upgrades by avoiding screen-scraping. We automate at the API and database layers. Scale to hundreds of thousands of users across mission-critical business processes. ClearWork enables Attended RPA for all ClearProcess bots. Create a single source of truth by streamlining data and functionality across systems. Thousands of pre-delivered automation for SAP, Salesforce, Oracle E-Business Suite, PeopleSoft, and other packaged software. -
49
Krontech Single Connect
Krontech
Establish a flexible, centrally managed and layered defense security architecture against insider threats with the world's leading Privileged Access Management platform. Single Connect™ Privileged Access Management Suite, known as the fastest to deploy and the most secure PAM solution, delivering IT operational security and efficiency to Enterprises and Telco's globally. Single Connect™ enables IT managers and network admins to efficiently secure the access, control configurations and indisputably record all activities in the data center or network infrastructure, in which any breach in privileged accounts access might have material impact on business continuity. Single Connect™ provides tools, capabilities, indisputable log records and audit trails to help organizations comply with regulations including ISO 27001, ISO 31000: 2009, KVKK, PCI DSS, EPDK, SOX, HIPAA, GDPR in highly regulated industries like finance, energy, health and telecommunications. -
50
HyperIP
NetEx Software
HyperIP is a software WAN optimizer (virtual appliance) that runs within your existing ESX/vSphere or Hyper-V infrastructure, improving the performance of storage replication and backup applications, as well as long-distance vMotion and other bulk data movement technologies. Formed in March 1999 as a spin-off of Storage Technology Corporation (StorageTek®, now part of Oracle after a previous acquisition with SUN Microsystems), privately held NetEx has provided data transport solutions for more than 20 years. NetEx HyperIP WAN optimization virtual appliance software meets the data protection and movement (file transfer) requirements for hundreds of the most progressive and demanding organizations in the world. NetEx customers range from small to medium businesses, mid-tier companies, small to medium enterprises and enterprise-class companies. These include government, financial services, airline, telecommunications, health care, real estate, and many other industry segments.