Alternatives to Enigma Virtual Box
Compare Enigma Virtual Box alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Enigma Virtual Box in 2024. Compare features, ratings, user reviews, pricing, and more from Enigma Virtual Box competitors and alternatives in order to make an informed decision for your business.
-
1
Google Compute Engine
Google
Compute Engine is Google's infrastructure as a service (IaaS) platform for organizations to create and run cloud-based virtual machines. Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications. Integrate Compute with other Google Cloud services such as AI/ML and data analytics. Make reservations to help ensure your applications have the capacity they need as they scale. Save money just for running Compute with sustained-use discounts, and achieve greater savings when you use committed-use discounts. -
2
Parallels RAS
Parallels
Parallels® Remote Application Server (RAS) is a remote work solution that provides secure virtual access to business applications and desktops on any device or OS—from anywhere. The platform offers an agile, cloud-ready foundation and end-to-end security fueled by a centralized management console with granular policies. Companies can leverage on-premises, hybrid, or public cloud deployments and integrate with existing technology like Microsoft Azure and AWS. Parallels RAS aims to give organizations the flexibility, scalability, and IT agility to adapt to changing business needs. Parallels RAS offers a single, full-featured licensing model that includes 24/7 support and access to product training. -
3
V2 Cloud
V2 Cloud Solutions
V2 Cloud offers a powerful yet simple Desktop-as-a-Service (DaaS) solution that makes desktop virtualization hassle-free. Tailored for Independent Software Vendors, business owners, Managed Service Providers, and IT managers, our platform is designed to boost productivity and scalability. With V2 Cloud, you can easily publish Windows applications, migrate your desktop to the cloud, and ensure seamless remote work from any location. Our solution is built for speed, security, and simplicity—allowing you to focus on your business without worrying about IT complexities. Enjoy complete support with no extra cost or meaningless waiting time. V2 Cloud’s affordable pricing and risk-free trial let you experience the benefits without commitment. Plus, our multilingual support helps businesses across the globe. Try V2 Cloud today and discover the easiest, most cost-effective way to virtualize your desktops. -
4
Thinfinity Workspace
Cybele Software, Inc.
Thinfinity® Workspace 7 is a comprehensive, secure platform that offers a zero-trust approach, enabling secure and contextual access to corporate virtual desktops, virtual applications, internal web apps, SaaS, and files, whether they are on Windows, Linux, or mainframes. It supports various deployment models, including cloud, on-premise, and hybrid settings, and can be deployed on any cloud provider of your choice. With its proprietary reverse gateway technology, Thinfinity® Remote Workspace 7 ensures secure reverse connections over SSL with TLS 1.3 encryption. This robust approach doesn't require client-side installations, firewall modifications, or the opening of inbound ports on your network, thereby enhancing the security infrastructure of your business. The platform ensures all browser-based connections are secured over HTTPS, offering a wide variety of authentication options, from straightforward User/Password to sophisticated Active Directory authentication. -
5
Kasm Workspaces
Kasm Technologies
Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm uses our high-performance streaming and secure isolation technology to provide web-native Desktop as a Service (DaaS), application streaming, and secure/private web browsing. Kasm is not just a service; it is a highly configurable platform with a robust developer API and devops-enabled workflows that can be customized for your use-case, at any scale. Workspaces can be deployed in the cloud (Public or Private), on-premise (Including Air-Gapped Networks or your Homelab), or in a hybrid configuration. -
6
VMware Fusion Pro
Broadcom
VMware Fusion gives Mac users the power to run Windows on Mac along with hundreds of other operating systems side by side with Mac applications, without rebooting. Fusion is simple enough for home users and powerful enough for IT professionals, developers and businesses. Running Windows on Mac is only the beginning. VMware Fusion lets you choose from hundreds of supported operating systems, from lesser-known Linux distributions to the latest Windows 10 release, to run side by side with the latest macOS release. Fusion makes it simple to test nearly any OS and app on a Mac. Build and test apps in a sandbox while securely sharing local source files and folders. Fusion Pro now includes a RESTful API to integrate with modern development tools like Docker, Vagrant, Ansible, Chef, and others to fit the power of VMware into today’s Agile and DevOps-oriented production pipelines. -
7
Azure Virtual Desktop
Microsoft
Azure Virtual Desktop (formerly Windows Virtual Desktop) is a comprehensive desktop and app virtualization service running in the cloud. It’s the only virtual desktop infrastructure (VDI) that delivers simplified management, multi-session Windows 10, optimizations for Microsoft 365 Apps for enterprise, and support for Remote Desktop Services (RDS) environments. Deploy and scale your Windows desktops and apps on Azure in minutes, and get built-in security and compliance features. Bring your own device (BYOD) and access your desktop and applications over the internet using an Azure Virtual Desktop client such as Windows, Mac, iOS, Android, or HTML5. Choose the right Azure virtual machine (VM) to optimize performance and leverage the Windows 10 and Windows 11 multi-session advantage on Azure to run multiple concurrent user sessions and save costs. -
8
VMware Workstation Pro
Broadcom
VMware Workstation Pro is the industry standard for running multiple operating systems as virtual machines (VMs) on a single Linux or Windows PC. IT professionals, developers and businesses who build, test or demo software for any device, platform or cloud rely on Workstation Pro. VMware Workstation Pro allows you to run multiple operating systems at once on the same Windows or Linux PC. Create real Linux and Windows VMs and other desktop, server, and tablet environments, complete with configurable virtual networking and network condition simulation, for use in code development, solution architecting, application testing, product demonstrations and more. Securely connect with vSphere, ESXi or other Workstation servers to launch, control and manage both virtual machines (VMs) and physical hosts. A common VMware hypervisor maximizes productivity and enables easy transfer of VMs to and from your local PC. -
9
Cameyo
Cameyo
Cameyo is the secure Virtual Application Delivery (VAD) platform for any Digital Workspace. Cameyo makes it simple, seamless, and secure to deliver Windows and internal web applications to any device from the browser without the need for virtual desktops or VPNs. By enabling organizations to provide their people with secure access to the business-critical apps they need to stay productive from anywhere, Cameyo helps make remote & hybrid work, work. Hundreds of enterprises and organizations utilize Cameyo’s Digital Workspace solution to deliver Windows and internal web applications to hundreds of thousands of users worldwide.Starting Price: $12.00/month/user -
10
Cuckoo Sandbox
Cuckoo
You can throw any suspicious file at it and in a matter of minutes Cuckoo will provide a detailed report outlining the behavior of the file when executed inside a realistic but isolated environment. Malware is the swiss-army knife of cybercriminals and any other adversary to your corporation or organization. In these evolving times, detecting and removing malware artifacts is not enough: it's vitally important to understand how they operate in order to understand the context, the motivations, and the goals of a breach. Cuckoo Sandbox is free software that automated the task of analyzing any malicious file under Windows, macOS, Linux, and Android. Cuckoo Sandbox is an advanced, extremely modular, and 100% open source automated malware analysis system with infinite application opportunities. Analyze many different malicious files (executables, office documents, pdf files, emails, etc) as well as malicious websites under Windows, Linux, macOS, and Android virtualized environments. -
11
Sandboxie
Sandboxie
Sandboxie is a sandbox-based isolation software for 32- and 64-bit Windows NT-based operating systems. It is being developed by David Xanatos since it became open source, before that it was developed by Sophos (which acquired it from Invincea, which acquired it earlier from the original author Ronen Tzur). It creates a sandbox-like isolated operating environment in which applications can be run or installed without permanently modifying the local or mapped drive. An isolated virtual environment allows controlled testing of untrusted programs and web surfing. Since the Open Sourcing sandboxie is being released in two flavors the classical build with a MFC based UI and as plus build that incorporates new features and an entirely new Q’t based UI. All newly added features target the plus branch but often can be utilized in the classical edition by manually editing the sandboxie.ini file. -
12
eyeOS Full Desktop
eyeOS
eyeOS is a virtual web desktop that can uniquely serve any Windows and Linux application in a browser and integrate, at the same time, SaaS or local web services. Virtualize your client-server applications in a web browser without complex PC installation. Centrally manage the user's workplace. Extend the life of your old PCs and business applications. Integrate virtual applications and cloud file management in a single virtual web desktop. eyeOS incorporates in a single place accessible from a browser all the applications that users need in their work environment. Inspired by massive cloud services, the eyeOS architecture offers a flexible solution with high availability and low resource consumption. Business applications evolve: they are no longer of the client-server type that requires the installation and maintenance of the client part on each PC. New versions are web-based, executed from public clouds in SaaS mode or directly from the Company's data center. -
13
ToolWiz Time Freeze
ToolWiz
Create a virtual environment as a copy of the real system where allows an unmodified operating system with all of its installed software to run, keeping your actual system frozen and away from unwanted changes and malicious threats. Nothing bad can happen to your PC while Toolwiz Time Freeze is up and running. Run multiple operation systems (real&virtual systems) at the same time on the same PC without reboot and easily switch between them to optimize your PC resources and improve efficiency. Consolidate the management and utilization of your system’s resources to help you build a more flexible and responsive IT infrastructure. No matter what changes are made, no matter what happens, a simple restart will return things to the way they were. Modifications made to the settings can be undone, files downloaded from the web can be removed, and other unwanted changes will all can be undone when you restart your PC. -
14
Shadow Defender
Shadow Defender
Shadow Defender is an easy-to-use security solution (for Windows operating systems) that protects your PC/laptop real environment against malicious activities and unwanted changes. Shadow Defender can run your system in a virtual environment called 'Shadow Mode'. 'Shadow Mode' redirects each system change to a virtual environment with no change to your real environment. If you experience malicious activities and/or unwanted changes, perform a reboot to restore your system back to its original state, as if nothing happened. With Shadow Defender, you have the flexibility to specify which files and folders are permanently saved to the real environment. This ensures important files and folders are kept after a reboot. If you want to make a maintenance-free computer, Shadow Defender will be your best choice. Surf the internet safely and eliminate unwanted traces. Eliminate system downtime and maintenance costs. Reboot to restore your system back to its original state.Starting Price: $39 one-time payment -
15
Parallels Desktop for Mac
Parallels
Whether you need to run Windows programs that don’t have Mac versions, or you are making the switch from PC to Mac and need to transfer your data, Parallels Desktop has you covered. Develop & test across multiple OSes in a virtual machine for Mac. Access Microsoft Office for Windows and Internet Explorer. Fast—run Windows apps without slowing down your Mac. Quickly move files, apps and more from a PC to a Mac. Use Windows side-by-side with macOS (no restarting required) on your MacBook, MacBook Pro, iMac, iMac Pro, Mac mini or Mac Pro. Share files and folders, copy and paste images and text & drag and drop files between Mac and Windows applications. Parallels Desktop automatically detects what you need to get started so you are up and going within minutes! If you need Windows, you’ll be prompted to Download and Install Windows 10 OR Choose your existing Windows, Linux, Ubuntu, or Boot Camp installation.Starting Price: $99.99 per year -
16
V-locity
Condusiv Technologies
Throughput acceleration software for virtual servers - boosts Windows application performance at least 30%. Guaranteed to solve your toughest application performance challenges on I/O intensive systems, like MS-SQL! V-locity eliminates the two big I/O inefficiencies in a virtual environment that generate a minimum of 30-40% I/O traffic that is nothing but mere noise dampening performance and unnecessarily chewing up precious storage IOPS. Not only can you expect an immediate boost and reclaim 30-40% of your storage IOPS, but many offload upwards of 50% of I/O traffic from storage for big performance gains in the 2X-10X range, by simply allocating a little extra memory on key systems to better leverage V-locity for an even bigger benefit on MS-SQL workloads, Oracle, ERP, VDI, EHR (MEDITECH), Business Intelligence (BI) apps, CRM, Exchange, SharePoint, file servers, backup, and more. Just download and install - no reboot required! Watch Performance return and shadow IT problems disappear!Starting Price: $524.95 -
17
CrossOver
CodeWeavers
Lots of people talk about open source. Talk is cheap. We code. Run your Windows® app on MacOS, Linux, or ChromeOS. CrossOver Mac® Do you like buying Windows® licenses? You do? Great. You do you. For the rest of humanity, CrossOver is the easiest way to run many Microsoft applications on your Mac without a clunky Windows emulator. (Seriously, have you tried emulators? Do you like how they run on your Mac?) CrossOver works differently. It's not an emulator. It does the work of translating Windows commands into Mac commands so that you can run Windows software as if it were designed native to Mac. CrossOver works with all kinds of software - productivity software, utility programs, and games - all with one application. CrossOver Linux® You are the noble of the noblest running Linux. You don't want the despair of running a Windows OS on your finely minted machine. You don't want to sell your soul for a Windows license or squander away your hard drive shekels running a virtual machineStarting Price: $59.95 -
18
SHADE Sandbox
SHADE Sandbox
You browse the internet everywhere and your device is at a threat of malware attack, therefore advanced appliance-based sandboxing is immensely useful. Sandboxing tool is like a protective layer that restrains viruses and malware in the virtual environment. SHADE Sandbox is used to safely execute suspicious code without any risk of causing harm to the network or host device. SHADE Sandbox is a program that creates an isolated environment. It is the most effective shareware sandboxing solution. Downloading and installing SHADE Sandbox for advanced malware attack prevention creates a layer of protection against any security threat, which is previously unseen cyber-attacks and particularly, stealthy malware. The best part of sandbox is what happens in the sandbox remains in it – prohibiting system failures and stopping software vulnerabilities from spreading. SHADE Sandbox and protect your PC!Starting Price: $ 21.02 per year -
19
Avast Premium Security
Avast
Spoofed (fake) websites are one of the oldest hacking tricks in the book. Avast Premium Security scans websites for security risks on both your computer and mobile phone, so you can finally shop and bank online safely on any device. Remote access attacks are on the rise — and the last thing you want is for a hacker to remotely take control of your PC and infect it with malware or lock your files with ransomware. Avast Premium Security now protects your PC against these attacks. Viruses, ransomware, scams, and other attacks target Windows more than any other operating system. So if you’re a PC owner, the stronger your protection, the better. Your Mac is not immune to malware. And malware isn’t even the only threat Macs face. Malicious websites and vulnerable Wi-Fi networks can also jeopardize your safety — unless you have the right protection. Android phones are vulnerable to both malware and theft.Starting Price: $39.99 per device per year -
20
VMware vSphere
Broadcom
Get the power of the enterprise workload engine. Boost workload performance, improve security and speed up innovation for your business. vSphere delivers essential services for the modern hybrid cloud. The new vSphere has been rearchitected with native Kubernetes to run existing enterprise applications alongside modern containerized applications in a unified manner. Transform on-premises infrastructure with cloud integration. Boost productivity with central management, global insights and automation. Power up with add-on cloud services. Meet the throughput and latency needs of distributed workloads by accelerating networking functions on the DPU. Free up GPU resources for faster AI/ML model training and higher complexity models. -
21
QEMU
QEMU
QEMU is a generic and open-source machine emulator and virtualizer. Run operating systems for any machine, on any supported architecture. Run programs for another Linux/BSD target, on any supported architecture. Run KVM and Xen virtual machines with near-native performance. Guest memory dumps are now fully supported, along with pre-copy/post-copy migration and background guest snapshots. Support for nw DEVICE_UNPLUG_GUEST_ERROR to detect guest-reported hotplug failures. macOS hosts with Apple Silicon CPUs now support ‘hvf’ accelerator for AArch64 guests. M-profile MVE extension is now supported for Cortex-M55. AMD SEV guests now support measurement of kernel binary when doing direct kernel boot (not using a bootloader). Support for vhost-user and numa mem options across all boards. -
22
Hyper-Q
Datometry
Adaptive Data Virtualization™ technology enables enterprises to run their existing applications on modern cloud data warehouses, without rewriting or reconfiguring them. Datometry Hyper-Q™ lets enterprises adopt new cloud databases rapidly, control ongoing operating expenses, and build out analytic capabilities for faster digital transformation. Datometry Hyper-Q virtualization software allows any existing applications to run on any cloud database, making applications and databases interoperable. Enterprises can now adopt the cloud database of choice, without having to rip, rewrite and replace applications. Enables runtime application compatibility with Transformation and Emulation of legacy data warehouse functions. Deploys transparently on Azure, AWS, and GCP clouds. Applications can use existing JDBC, ODBC and Native connectors without changes. Connects to major cloud data warehouses, Azure Synapse Analytics, AWS Redshift, and Google BigQuery. -
23
Reboot Restore Rx
Horizon Datasys
Protect your public PCs from going out-of-order. Instantly reset to the baseline on startup or hard reset. Update the baseline without restarting your computer. Drastically reduces computer maintenance, and can be used to protect tier one public access computing environments. (Formerly Drive Vaccine) Reboot Restore Rx Pro prevents any and all changes made on your drive(s) making those PCs bulletproof and unbreakable. It is designed for public access computing environments such as schools, computer labs, kiosks, hotels, internet cafes, and libraries. We understand it takes a certain fortitude to service PCs in the public domain where users are not always careful and computer usage is high. That is why we built Reboot Restore Rx Pro to be fast, effective and efficient. Regardless of what a user does (including erasing files, installing software or even hacking the system registry) Reboot Restore Rx Pro will automatically restore the PC to your desired system state on a schedule you set.Starting Price: $39.00/one-time/user -
24
Flexiant Cloud Orchestrator
Flexiant
To sell cloud, you lease your virtualized infrastructure, ease and track cloud usage within a customer organization and find new routes to reach the largest cloud market. A cloud business won’t scale without a completely automated billing process. A prerequisite for success is the ability to bill and take payments based on accurately measured consumption data. Flexiant Cloud Orchestrator includes a fully integrated billing system for your fastest go-to-market opportunity. Integrating Flexiant Cloud Orchestrator into your existing workflows is extremely easy thanks to its powerful API and extensible interface. Your customers want to have a choice. To lower the risk of migration, or simply to preserve their application certification, they want to be able to decide which hypervisor should power their workload. A dynamic workload placement algorithm to make the most sensible decision on where to start a virtual machine. -
25
vSpace
NComputing
You have a room or office full of people who all need computers. You could buy them, but that’s expensive and boring, at least until they start having issues. Then they’re expensive and frustrating. The smarter approach is to simplify what you deploy and save a bunch of time, money and effort. So you buy a server and install vSpace Pro Enterprise Edition. It’s replacing all those computers and hosts your virtualized desktops, probably in another room where you can’t see or hear it. You give each of your users a keyboard, mouse and monitor, then plug them into an NComputing access device like the RX300. Connect to your network via LAN or WIFI, and now each of your people have their own virtual computer with support for the latest Windows operating systems. Rejoice, the user data is on the server and easily backed-up. The applications and operating system are as well, so you are maintaining just one server instead of an army of computers. -
26
VirtualBox
Oracle
VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL) version 2. See "About VirtualBox" for an introduction. Presently, VirtualBox runs on Windows, Linux, Macintosh, and Solaris hosts and supports a large number of guest operating systems including but not limited to Windows (NT 4.0, 2000, XP, Server 2003, Vista, Windows 7, Windows 8, Windows 10), DOS/Windows 3.x, Linux (2.4, 2.6, 3.x and 4.x), Solaris and OpenSolaris, OS/2, and OpenBSD. VirtualBox is being actively developed with frequent releases and has an ever growing list of features, supported guest operating systems and platforms it runs on. VirtualBox is a community effort backed by a dedicated company. -
27
V-OS is V-Key’s core patented technology, a virtual secure element. It is a secure sandbox that is embedded within a native iOS or Android mobile app and creates a safe operating environment where data can be stored and cryptographic processes can be executed in isolation from the rest of the mobile app. In this video, we take a step back to introduce and explain the core of our technology, V-OS. With V-OS as the security foundation of your mobile application, your organization can build a wide range of solutions that are secure, trusted and scalable, and customized to your business needs. Layered tamper detection and response mechanisms. Patented cryptographic virtual machine. FIPS 140-2 Level 1 and Common Criteria EAL3+. Minimizes total costs of ownership. Faster market penetration with effortless over-the-air deployment. Flexible and extensible SDK framework. Eradicate costly hardware dependency.Starting Price: Free
-
28
IBM® Rational® Test Virtualization Server software enables early and frequent testing in the development lifecycle. It removes dependencies by virtualizing part or all of an application or database, so software testing teams don’t have to wait for the availability of those resources to begin. Reduce the cost of deploying and configuring complex application environments. Achieve agility and predictability with continuous integration testing earlier in the development lifecycle. Integrate with IBM Collaborative Lifecycle Management, which provides collaborative testing. Virtualization capabilities range from data-driven and correlated response sequences to full stateful database emulation. A centralized repository of virtualized environments means you can reuse, deploy and change the environment configuration to test different scenarios. IBM Rational Test Virtualization Server offers all the features in IBM Rational Performance Test Server to help validate app performance.
-
29
FortiSandbox
Fortinet
Unlike previous generation of viruses that were non-sophisticated and low in volume, antivirus tools were sufficient to provide reasonable protection with their database of signatures. However, today’s modern malware entails new techniques such as use of exploits. Exploiting a vulnerability in a legitimate application can cause anomalous behavior and it’s this behavior that attackers take advantage of to compromise computer systems. The process of an attack by exploiting an unknown software vulnerability is what is known as a zero-day attack aka 0-day attack, and before sandboxing there was no effective means to stop it. A malware sandbox, within the computer security context, is a system that confines the actions of an application, such as opening a Word document, to an isolated environment. Within this safe environment the sandbox analyzes the dynamic behavior of an object and its various application interactions in a pseudo-user environment and uncovers any malicious intent. -
30
Glassware
Glassware
Optimized for simplicity, flexibility and scalability, Sphere 3D’s Glassware 2.0 platform eliminates the complex tasks of designing, implementing, and maintaining application hosting environments, extending the benefits of secure scalable server-based computing to all. Glassware 2.0 extends the useful life of applications by decoupling the application from the underlying operating system. Glassware 2.0 can virtualize 16, 32, and 64-bit Microsoft Windows applications* and deliver them with native functionality to most end user devices: Chromebooks, Windows 10 clients, iPads, thin clients, tablets, etc. Glassware 2.0 uses a container-based approach to application virtualization deployed on servers, coupled with a remote presentation capability, to seamlessly deliver applications to end user computing devices. Unlike hypervisor-based approaches, with Glassware 2.0 the application’s host OS is never installed on the appliance (server). -
31
Systancia Workplace
Systancia
Systancia Workplace, formerly AppliDis Fusion, is an innovative virtualization solution that allows all applications and desktops to be made available using the most recent security, load balancing, ergonomic and Machine Learning technologies in order to guarantee the best experience for both user and administrator. A clear and intuitive administration console, print management integrated natively into the solution, the ability to manage multi-version MS Windows Server application server farms and a strong and reactive involvement of the publisher, not to mention the cost reduction induced by the change. Systancia Workplace BoxOnAir for a truly productive mobility without any security compromises. Systancia Workplace Cloud Extender to provide the flexibility of the cloud in the local datacenter with mixed application. -
32
everRun
Marathon Technologies
Most companies today have a variety of mixed workloads, with different levels of business criticality. The smartest organizations are sizing and designing their IT infrastructure to match the availability requirements of their applications, and paying only for what they need. Fault-tolerant systems for those applications that must work 24/7/365. High availability systems where up to 4 hours of downtime could be acceptable. everRun simplifies the process of meeting your changing availability requirements. A highly versatile, yet affordable and continuously available software solution, everRun , combined with industry-standard x86 systems, quickly and easily protects your virtualized data and workloads. Use everRun to quickly and cost-effectively deliver the levels of continuous availability you need, when and where you need it. -
33
KVM
Red Hat
KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware containing virtualization extensions (Intel VT or AMD-V). It consists of a loadable kernel module, kvm.ko, that provides the core virtualization infrastructure and a processor specific module, kvm-intel.ko or kvm-amd.ko. Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images. Each virtual machine has private virtualized hardware: a network card, disk, graphics adapter, etc. KVM is open source software. The kernel component of KVM is included in mainline Linux, as of 2.6.20. The userspace component of KVM is included in mainline QEMU, as of 1.3. -
34
Nomadesk
Nomadesk
Business File Sharing & Synchronization software that allows your professional customers to edit, share, synchronize and secure files from anywhere, online and offline! Nomadesk creates encrypted, virtual hard drives on your computer – “Vaults”. Place your files in a Vault and they are automatic. Retention of multiple versions; cloud-based trashcan, datacenters in Brussels and Frankfurt. Your files are made accessible via any smartphone, tablet; encrypted cache with remote wipe.Invite others to your Vaults for collaborating on files; use the Nomadesk widget to automatically publish content on your website; share file links via the Outlook plugin. Through our Office 365 integration, you can effortlessly view, edit and collaborate simultaneously on Office files from any device. You wish to market a scalable, business file sharing and sync solution without the operational hassle. Start building recurring revenue!Starting Price: $7.50 per month -
35
KubeVirt
KubeVirt
KubeVirt technology addresses the needs of development teams that have adopted or want to adopt Kubernetes but possess existing Virtual Machine-based workloads that cannot be easily containerized. More specifically, the technology provides a unified development platform where developers can build, modify, and deploy applications residing in both application containers as well as virtual machines in a common, shared environment. The benefits are broad and significant. Teams with a reliance on existing virtual machine-based workloads are empowered to rapidly containerize applications. With virtualized workloads placed directly in development workflows, teams can decompose them over time while still leveraging the remaining virtualized components as is comfortably desired. Combine existing virtualized workloads with new container workloads on the one platform. Support development of new microservice applications in containers that interact with existing virtualized applications. -
36
Hive Fabric
HiveIO
HiveIO Delivers the Most Advanced Virtualization Platform for VDI. Period. The only solution to deliver an entire Virtual Desktop Infrastructure, tightly integrated into a single product. For many organizations considering VDI, Microsoft’s Windows Virtual Desktop seems like a great option at first glance. However, there are several questions you should ask before making a quick decision. This whitepaper will explore several key considerations when determining if WVD is the best choice for your team. HiveIO’s free community edition is intelligent virtualization software that give you the ability to create 5 virtual machines on a single host. See how Hive Fabric enables your remote workforce in a secure fashion -- at a fraction of the cost of other VDI options. Using swarm theory, intelligently utilize resources and scale your infrastructure. -
37
Barracuda SSL VPN
Barracuda Networks
Your army of road warriors and remote workers require a quick, flexible, reliable and completely secure way to connect to your internal enterprise applications, information and network resources. They want to do this from anywhere in the world, at any time and from any suitable device. The Barracuda SSL VPN provides the security and connectivity to deliver this access, via a web browser or virtually any mobile device. The Barracuda SSL VPN makes it easy for remote users to access internal applications and files. Unlike traditional VPN technologies, the Barracuda SSL VPN does not require any additional client software or complicated settings. Logging in from home or the road requires only a web browser and Internet connection. Upon login, users are presented with a portal of internal web applications or file shares. More advanced applications like Remote Desktop Services or Citrix XenApp are available to users running Java. -
38
Serial to Ethernet Connector
Electronic Team, Inc.
Serial to Ethernet Connector is a stable software product developed by Electronic Team Inc. and has been available commercially for over a decade. The application lets you create multiple virtual COM ports on a machine with no physical serial interfaces. This virtual serial port redirector enables you to access the functionality of multiple remote serial devices over the network. You system’s capabilities are the only limit on the number of virtual ports you can create with this COM port redirector utility. It transmits serial data over the Ethernet from your computer to network-attached serial devices.Starting Price: $259.95/1 machine at a time -
39
Joe Sandbox
Joe Security
Tired of high level malware analysis? Perform one of the deepest analysis possible - fully automated or manual - from static to dynamic, from dynamic to hybrid, from hybrid to graph analysis. Rather than focus on one, use the best of multiple technologies including hybrid analysis, instrumentation, hooking, hardware virtualization, emulation and machine learning / AI. Check out our reports to see the difference. Deeply analyze URLs to detect phishing, drive by downloads, tech scam and more. Joe Sandbox uses an advanced AI based algorithm including template matching, perptual hashing, ORB feature detection and more to detect the malicious use of legit brands on websites. Add your own logos and templates to extend the detection capabilities. Interact with the sandbox through Live Interaction - directly from your browser. Click through complex phishing campains or malware installers. Test your software against backdoors, information leakage and exploits (SAST and DAST). -
40
Avira Cloud Sandbox
Avira
The Avira Cloud Sandbox is an award-winning, unlimited-scale automated malware analysis service. It blends multiple advanced analysis technologies to deliver a complete threat intelligence report from an uploaded file. The Cloud Sandbox API delivers a detailed, file-specific, threat intelligence report. It contains valuable, actionable intelligence. The report has a detailed classification of the file, information on the techniques, tactics and procedures (IoCs) present in the threat, and a description of how and why the submitted file was identified as clean, malicious, or suspicious. Avira’s Cloud Sandbox leverages the technologies developed within the Avira Protection Cloud, the cloud security system that underpins the anti-malware and threat intelligence solutions of Avira. Through OEM technology partnerships we protect many of the world’s leading cyber-security vendors, and nearly a billion people world-wide. -
41
VMware NSX
Broadcom
Full-Stack Network and Security Virtualization with VMware NSX. Enable your virtual cloud network to connect and protect applications across your data center, multi cloud, bare metal, and container infrastructure. VMware NSX Data Center delivers a complete L2-L7 networking and security virtualization platform — providing the ability to manage the entire network as a single entry from a single pane of glass. Bring one-click provisioning to your networking and security services — access powerful flexibility, agility, and scale — by running a complete L2-L7 stack in software, decoupled from underlying physical hardware. Manage consistent networking and security policies across private and public clouds, from a single pane of glass, regardless of where your application runs – VM, container, or bare metal. Deliver granular protection for your apps via micro-segmentation to the individual workload.Starting Price: $4,250 -
42
CloudDesk
CloudDesk
CloudDesk offers an end-to-end suite of products to deploy our Next-Gen Virtual Workspace solution with the objective of helping clients build new levels of user experience and business values through enhancing your IT agility. A software to create PC lab maps and schedules, and allows end-users to view resources availability in various locations (campuses, offices) and conveniently book desktop and release resrouces through a web portal. A web portal that allows end-users to create, configure and provision their own desktop and resources, and login to access any of their personal desktop anytime, anywhere. A unique client-based processing virtualization platform for streaming desktop and enables users to access desktop offline. An application virtualization software which streams applicaitons to desktop that eliminates compatibility issues. A lightweight server-based processing VDI platform that allows pooled or personalized virutal desktop. -
43
Comodo Internet Security
Comodo
Our sandbox technology automatically locks unknown files in a secure environment while our Valkyrie system tests their behavior in real-time - protecting you against malware that the virus industry hasn’t even discovered yet. Hot spot protection that encrypts all data transmitted over both wired and wireless Internet connections up to 10GB per month. Secure Shopping lets you shop and bank online with confidence. This breakthrough technology isolates your browser inside a secure container which cannot be hacked, tracked or viewed by malware or internet thieves. Tracks down and destroy any existing malware hiding in a PC. Detects spyware threats and destroys each infection. Prevents malicious software turning your PC into a zombie. Protects critical system files and blocks malware before it installs. Cutting-edge protection against sophisticated buffer overflow attacks.Starting Price: $29.99 per year -
44
HyperIP
NetEx Software
HyperIP is a software WAN optimizer (virtual appliance) that runs within your existing ESX/vSphere or Hyper-V infrastructure, improving the performance of storage replication and backup applications, as well as long-distance vMotion and other bulk data movement technologies. Formed in March 1999 as a spin-off of Storage Technology Corporation (StorageTek®, now part of Oracle after a previous acquisition with SUN Microsystems), privately held NetEx has provided data transport solutions for more than 20 years. NetEx HyperIP WAN optimization virtual appliance software meets the data protection and movement (file transfer) requirements for hundreds of the most progressive and demanding organizations in the world. NetEx customers range from small to medium businesses, mid-tier companies, small to medium enterprises and enterprise-class companies. These include government, financial services, airline, telecommunications, health care, real estate, and many other industry segments. -
45
Falcon Sandbox
CrowdStrike
Falcon Sandbox performs deep analysis of evasive and unknown threats, enriches the results with threat intelligence and delivers actionable indicators of compromise (IOCs), enabling your security team to better understand sophisticated malware attacks and strengthen their defenses. Unique hybrid analysis technology detects unknown and zero-day exploits while defeating evasive malware. Uncover the full attack lifecycle with in-depth insight into all file, network, memory and process activity. Save time and make all security teams more effective with easy-to-understand reports, actionable IOCs and seamless integration. The most sophisticated analysis is required to uncover today’s evasive and advanced malware. Falcon Sandbox’s Hybrid Analysis technology exposes hidden behavior, defeats evasive malware and delivers more IOCs, to improve the effectiveness of the entire security infrastructure. -
46
CloudPhysics
CloudPhysics
HPE CloudPhysics is a simple SaaS solution that monitors and analyzes IT infrastructures, offering insights and reports that help you upgrade, repair, and adapt data centers to changing needs. The platform also simulates possible migrations to the various cloud platforms, estimating costs and viability, as well as modeling your exact infrastructure as a virtual environment, machine-by-machine, to provide the data you need to decide between cloud and on-premise infrastructures. Why build spreadsheets, when you can instantly get migration and costing strategies for the cloud? Quickly classify, group, and consolidate all data center workloads into a single view. Review HPE CloudPhysics’ comprehensive workload-sizing and costing models for workloads. Then apply your rightsized models to cloud pricing models for immediate value on an enterprise-scale! Before investing in new hardware and resources for your next IT budget cycle, get a handle on your current workloads. -
47
Clonetab
Clonetab
For ERPs like Oracle e-Business Suite, PeopleSoft & Databases Clonetab is the only software which can virtualize and provide true end-to-end on-demand clones of ERPs (like Oracle e-Business Suite, PeopleSoft) or databases. It can also provide an integrated solution for virtualization, cloning, Disaster Recovery, Backups and Oracle EBS Snapshots. Clonetab engines – Deeply aware of ERP Applications, not just Databases The engines are deeply EBS & PS aware and can identify the major releases (e.g. R12.1, R12.2) and patchset levels like AD, TXK and executes the clone commands accordingly. The platform provides options to retain EBS/PS specific options like profile option retention, Concurrent/Process scheduler setups retention, EBS users with responsibilities retention, Database links, Directories retention, workflows setups and many more options, resulting in a true end-to-end ERP clone. -
48
AP Lens
AP Lens
AP Lens is a Sandbox Browser that isolates networks using DNS Whitelisting. We stop the attack before it reaches the network. What does AP Lens provide? - Web Filtering: Flexible and user-friendly content blocking. - Anti-Phishing: Stop look-alike domains with 100% accuracy. - Ransomware Protection: Isolate the network without affecting business applications. - Secure Remote Work: Enforce internet usage policies without VPN slowness. - No More 0-Day Attacks: Escape the limits of blacklisting with AP Lens Augmented Whitelist. - Compliant: AP Lens meets regulatory requirements requested by cybersecurity insurance policies. - One-Click Installation: No need for a lengthy setup process or updating from the user's side. - No Maintenance: Stop malware and phishing without continuous monitoring. Our team builds on over 20 years of experience in cyber security, cloud security, and information protection in industries such as private banking and the public sector.Starting Price: $5 -
49
Ensure the security of your workloads, simplify regulatory compliance, and guarantee data sovereignty with IBM Cloud Secure Virtualization. A trusted cloud infrastructure must be able to answer these questions for corporate oversight, security, and compliance. A customer wants to create an environment where administration, workload execution, and data access are constrained to a particular geo-location with full audit capabilities. During deployment, identify the firmware configurations you will allow and the hypervisor configurations you have approved. Accurately identify each physical host and its physical location, creating a snapshot or fingerprint of each trusted host's launch configuration. This is stored in an allowlist. If the measurements of a host's BIOS and hypervisor match the measurements stored in the allowlist, the boot environment is attested. The host launches into a state that is considered trusted.
-
50
Ostia Portus
Ostia Software Solutions
In many of today’s institutions, implementation of a new product idea or product enhancement takes months, if not years. This is the result of complex IT environments and infrastructure; change control and the need for production stability and reliability, security considerations etc. – the list is long. Wouldn’t it be great if one could implement a new product idea in weeks? Portus is a technology for the creation of clever test systems on demand. It tackles the challenge of making complex IT test systems available quickly and on demand by creating simulations of the required links to the back office IT systems. This enables test systems to be made available sooner thus reducing the test timeline from months (according to our reference customers) to weeks or even days. This converts to earlier delivery of new or enhanced applications with less risk and at reduced cost. Portus test systems can be created in days, on cost effective commodity hardware and software.