101 Integrations with Microsoft Hyper-V
View a list of Microsoft Hyper-V integrations and software that integrates with Microsoft Hyper-V below. Compare the best Microsoft Hyper-V integrations as well as features, ratings, user reviews, and pricing of software that integrates with Microsoft Hyper-V. Here are the current Microsoft Hyper-V integrations in 2024:
-
1
Centreon
Centreon
Centreon is a global provider of business-aware IT monitoring for always-on operations and performance excellence. The company’s holistic, AIOps-ready platform is designed for today’s complex, distributed hybrid cloud infrastructures. Centreon monitors the complete IT Infrastructure from Cloud-to-Edge for a clear and comprehensive view. Centreon removes blind spots, monitoring all equipment, middleware and applications that are part of modern IT workflows, from on-premise legacy assets to private and public cloud environments, all the way to the edge of the network, where smart devices and customers combine to create business value. Centreon is constantly current, able to support the most dynamic environments. With auto-discovery capabilities it can keep track of Software-Defined Network (SDN) elements, AWS or Azure cloud assets, Wi-Fi access points or any other component of today’s agile IT infrastructure. -
2
PrinterTux
HE Soluções
The PrinterTux is a software and management, control and ticketing of print. Compatible with the platforms Windows, Mac and Linux. Through printing reports by users, groups and printers, it is possible to raise the quantity and cost of all prints made in the company. The software allows you to implement quota control, thus reducing waste, in addition to expenses with ink, toner, paper and printer maintenance. In many companies, paper is the biggest source of waste, with the implementation of the PrinterTux Software, the reduction in paper consumption will be noticeable. Thus, your business will contribute to the environment. With Printertux, it is possible to generate print reports by users, groups, printers, to survey the quantity and cost of all prints made in the company. Reduce your printing costs, save and contribute to the environment! The Printertux print server, is a customized Linux distribution, based on Fedora. -
3
StealthRECOVER
Netwrix
Fine-grained rollback and recovery for Active Directory. Malicious or accidental changes to AD represent a significant security and performance risk. As the primary authentication and authorization service for the majority of IT systems, the importance of Active Directory (AD) integrity and availability is paramount. Rolling back or recovering changes – whether from human error or malicious intent – leveraging native AD capabilities is difficult at best, and in some cases impossible. While the AD Recycle Bin, when enabled, can recover a deleted object, Microsoft does not offer an out-of-the-box way to rollback changes to directory objects to a previous state. As part of Stealthbits’ Active Directory solution portfolio, StealthRECOVER enables organizations to quickly and easily rollback and recover unintended directory changes. e. Easily browse multiple snapshots and leverage granular full text search to effortlessly rollback and recover only the information that is required. -
4
Actian Zen
Actian
Actian Zen is an embedded, high-performance, and low-maintenance database management system designed for edge applications, mobile devices, and IoT environments. It offers a seamless integration of SQL and NoSQL data models, providing flexibility for developers working with structured and unstructured data. Actian Zen is known for its small footprint, scalability, and high reliability, making it ideal for resource-constrained environments where consistent performance and minimal administrative overhead are essential. With built-in security features and a self-tuning architecture, it supports real-time data processing and analytics without the need for constant monitoring or maintenance. Actian Zen is widely used in industries like healthcare, retail, and manufacturing, where edge computing and distributed data environments are critical for business operations. -
5
ThirdEye
LogicVein
ThirdEye by LogicVein includes advanced network configuration and change management (NCCM) capabilities and network monitoring system (NMS) for large enterprise data centers. ThirdEye is an integrated and cloud ready solution. Including the tools, reporting, automation and integration capabilities you need in a low cost and easy to use package. With ThirdEye, you will reduce cost, save time, manage your configurations and changes, in addition, be alerted if there are any issues with your devices. ThirdEye has all the features and functions of Net LineDancer, with enhanced additional features that allow you to monitor, alert and generate traps on devices. All the features you have in Net LineDancer, you still have in Thirdeye, but with the additional enhanced features of performance monitoring and alarming. By creating a dashboard for each site or system, you can check the monitoring status for each site at a glance. -
6
SOLIDserver DDI
efficient IP
The SOLIDserver™ DDI suite is designed to deliver highly scalable, secure and robust virtual and hardware appliances for critical DNS-DHCP-IPAM services. It provides vital benefits for the agility, reliability, and security of your network infrastructure. SOLIDserver is the cornerstone of DNS, DHCP and IP Address Management (DDI) projects for datacenter automation, internet DNS, LAN infrastructures, cloud computing, digital transformation and any IT organization dealing with the challenges of a dynamic and secure infrastructure. DDI helps software defined networking (SDN) become fully integrated to the whole IT ecosystem, from orchestration of application deployment to IT Service Management (ITSM) process control. EfficientIP DDI appliances strengthen your core network foundations to support your business imperatives to improve business continuity and decrease operating costs with smart automation. -
7
The Bosch Video Management System is a unique enterprise IP video security solution that provides seamless management of digital video, audio, and data across any IP network. It provides the best VMS to go with Bosch CCTV devices, leveraging the unique capabilities of Bosch cameras and recording solutions. It nevertheless offers interfaces and standards to integrate other systems and manufacturers. The system is equipped with a unique embedded resilience. It keeps operations up and running even when both, Management and Recording Servers fail. On edge intelligent Video Analyses and the unmatched recording technology managing up to 2000 cameras (including up to 500 ONVIF cameras) with a single server dramatically reduces the total cost of ownership. Single Management Server System 1 to 2000 cameras out of the box. Only this system supports Bosch VMS-BIS Connectivity. Supporting multi Management Server requirements for metro, airport and others.
-
8
StorMagic SvKMS
StorMagic
We believe enterprises deserve a one-stop approach to key management. SvKMS provides a single platform that manages all your encryption keys, anywhere. Customers get an enterprise key manager for any encryption workflow, whether at the edge, data center, cloud or even multi-cloud. SvKMS has enterprise-grade features delivered in a simple to use interface, all at a surprisingly low cost. Deploy anywhere, high availability without boundaries, integrate with any workflow. Advanced key management, powerful reporting & authorization, lowest price for massive scale. Centralized management, easy configuration, effortless administration. Unify all encryption key management processes in a centralized virtual appliance. Providing widely accessible risk reduction via GUI, integrated REST API-enhanced workflows and KMIP standardization help SvKMS deliver rapid customization, logging, dashboard auditing and monitoring for all deployment scenarios. -
9
InfiniBox
Infinidat
The InfiniBox® enterprise storage system delivers faster than all-flash performance, multi-petabyte capacity, and 100% availability for a broad range of mixed application workloads. Infinite zero-impact snapshots, dependable active/active, synchronous & asynchronous replication, and flexible, software-defined quality of service come standard, with guaranteed reliability and data security. With InfiniBox, enterprise IT organizations and managed service providers are able to exceed their service level objectives while radically lowering the cost and complexity of their storage operations. Infinidat customers routinely consolidate entire rows of legacy enterprise storage onto a single InfiniBox system, leading to 10:1 reductions in both floor tiles and network port costs. InfiniBox eliminates storage array and filer sprawl, allowing operations and capacity planning teams to leverage the economies of scale of unified data center-scale pools of storage. -
10
Storware
Storware
Unparalleled data resiliency for virtual machines, containers, cloud environments, storage providers, endpoints, and Microsoft 365. One system, one universal license, many uses. Choose efficiency, transparency, cost savings. Choose true freedom of choice with our one universal license. Get rid of vendor lock-in with a stable, agentless suite of backup and snapshot management solutions for multiple open source and commercial hypervisors. Improve and automate backup performance for modern workloads. Save your resources, time, and money using an agentless, crash-consistent backup of deployments running in Kubernetes environments and stored on persistent volumes. Get the assurance of data recoverability in the event of a disaster: ransomware attack, device damage, data deletion. Maintain your business data with innovative backup solutions for Windows-based desktops and laptops. Complete backup and recovery solution for OneDrive for Business, SharePoint Online, Exchange Online, etc. -
11
Unitrends Helix
Unitrends
Helix automatically identifies and fixes Windows issues before they have a chance to impact your backups. Less management, greater resilience. IT can get bogged down with monitoring, detecting, and remediating conditions that impact backup. These are time-consuming tasks that prevent other projects from getting done. Unitrends Helix is here to change all that. Helix is like another set of eyes and ears for IT. There is no management necessary. Just deploy, and it starts monitoring for problematic conditions automatically. Proactively keep appliances up to date and remediate issues with VSS services and third-party VSS providers that wreak havoc on backups. Helix will evolve quickly. It will learn more use cases and common problems to troubleshoot and fix for you, based on Unitrends’ 30 years of experience helping customers. Helix is SaaS-based and communicates with on-prem or cloud environments protected by Unitrends backup appliances. -
12
Magnus Box
Magnus Box
Deploy and scale backups for your clients with industry-leading security and support. We charge a flat fee per device per month, you pay nothing extra for data usage. The Magnus Box team is HIPAA trained and certified. All data is encrypted, with zero personal information exposure. Magnus Box was created because of these kinds of situations. We tried other backup solutions, and they either limit how much data you can backup, or they are too complicated or too clunky to use. Magnus Box fills these gaps by being easy to use and allowing unlimited data. Magnus Box is available exclusively to technology service providers, computer repair providers, and MSPs worldwide. Magnus Box will never sell directly to the general public. Why do we do this? We do this because we were where you are, trying to provide services to our clients when our providers were directly competing with us. Our team has extensive first-hand experience in the MSP industry. -
13
Vaulten
Vaulten
Ease and convenience of having your data anytime anywhere. Back up the whole fleet of workstations and servers with Vaulten Professional. Vaulten offers unlimited cloud, onsite & hybrid backup. Online automatic data backup solutions for your digital assets. Back up all your data to unlimited space, file type, and file size along with bandwidth regulation. Secured with multiple-level security, enhanced with a password to private & public keys. A faster and alternative way to backup your initial data or restore it handy. Vaulten designed different plans for meeting your business requirement. Vaulten is one of the fastest applications equipped with speed-optimizing technology and other features. It has dedicated backup modules for VMware, Hyper-V, oracle database, MS SQL MySQL, lotus dominos/notes, Windows Bare Metal, MS Exchange (database and individual mail), Sharepoint and system state. -
14
Power IQ
Raritan
Power IQ® DCIM Monitoring Software enables data center and facility managers to closely monitor and efficiently utilize their existing data center power infrastructure. Data center health maps, power analytics, cooling charts, and reports alert you to potential trouble and help you understand real-time power load, trends, and capacity at all levels of infrastructure. A configurable dashboard provides vendor-agnostic views of power capacity, environmental health, and energy consumption. Get single-click access to rack power, cooling, airflow, events, and much more. A complete environment management solution that helps you to identify potential trouble areas, save energy, and maintain a safe environment for your IT equipment. Consolidate the names, polling status, locations, models and firmware for all your rack power distribution units (PDUs) onto one screen and save valuable management time that can be allocated to other priorities. -
15
IBackup
Pro Softnet
Being a small business, you may have multiple computers, laptops, mobile devices and servers. The data on these devices, including always running applications like quickbooks or your Microsoft Exchange - You cannot afford to lose them. So, how do you protect all of your critical data cost effectively, securely and easily? IBackup gives you automatic and continuous cloud backup, for multiple devices, at one price. With us, you can be at peace, knowing your files are being safely backed up and will be available to you whenever you need them.Starting Price: $9.95 per month -
16
Network Glue
IT Glue
All-in-one automated discovery, documentation, password rotation, and diagramming solution. Leave the site walks to us. The Network Glue collector detects all devices on your clients’ networks regardless of vendor. It even discovers Active Directory environments including the AD role of each workstation and server, and automatically brings in AD users from on-premises or hybrid environments. Say goodbye to hidden devices and incomplete user information. All network devices, as well as cloud, hybrid, and on-premises user information from Azure AD and Active Directory, are automatically documented and updated in IT Glue. This includes virtual components of networks for Hyper-V and VMware. We can’t all be artists. Let Network Glue generate comprehensive network diagrams for you. Unique icons help to quickly interpret network diagrams, and are fully integrated with IT Glue so contextual information is pulled up when a device icon is clicked.Starting Price: $29 per month -
17
MyGlue
IT Glue
MyGlue is your collaboration and intranet portal, creating a direct line for meaningful communication with end-users. Leave insecure email exchanges, shoulder-tapping, and one-off conversations behind. IT professionals have to manage more devices, more data, and more users than ever before. With a collaboration and intranet platform in your stack, easily and securely share IT documentation and collaborate with end-users. MyGlue is packed with features, many of which you’ll recognize from IT Glue. From the password vault to checklists, to the security features like audit trail, version history, and SOC 2 compliance, MyGlue has everything your end-users need to manage their passwords and process documentation. With the introduction of the MyGlue help center, sharing documents such as “how-to’s” has never been easier. Enjoy a holistic approach to managing communications, documentation, and password management across the entire organization and all teams within.Starting Price: $29 per month -
18
Dell EMC NetWorker
Dell Technologies
Use Dell EMC NetWorker software for unified backup and recovery of your enterprise applications and databases. With centralized administration, NetWorker helps you take advantage of the data protection that fits your needs best: deduplication, backup to disk and tape, snapshots, replication, and NAS. NetWorker protects both physical and virtual environments including VMware and Microsoft Hyper-V. Whether you’re protecting applications and data residing within your data center or the public cloud, NetWorker provides the same enterprise-level user experience. With cloud capabilities, NetWorker offers a solution for cloud data protection with optimizations to secure your data everywhere. NetWorker is available as virtual edition or as a component of the Dell EMC Data Protection Suite, which offers you a complete suite of data protection software options. -
19
Argent
Argent Software
Argent Guardian® Ultra is the world's most scalable monitoring solution for all Windows, Linux, UNIX (AIX, HP-UX, SCO, Solaris), and iSeries Servers. Using a patented agent-optional architecture, Argent Guardian® Ultra monitors servers with or without installing agents, providing the power and flexibility to define the monitoring architecture to match customers' exact needs. The days of manually scheduling and managing batch processes are over. Business process automation lowers overall IT costs, ensures application efficiency, enhances IT service and assists with compliance requirements. Argent Job Scheduler and Argent Queue Engine automate business processes, alert customers via Argent Console when issues occur and provide Service Level Agreements so that management receives the Business View of IT. Argent Job Scheduler provides a single point of control across all operating systems, applications and databases for Windows, Linux, Solaris, HP-UX, AIX, SCO and iSeries Servers. -
20
IntranetBOX
IntranetBOX
The intranet software "IntranetBOX" is the ideal employee portal for your company. With this intranet solution you can easily share your knowledge, store data in a structured manner and optimize the flow of communication in your company. The IntranetBOX can be implemented easily and inexpensively and adapted individually. The simple handling guarantees a future with growing success. Reducing the internal organizational effort, for example by reducing data maintenance, increases the efficiency of the work processes. With numerous options, the company's knowledge is prepared faster and more easily and further processed in the company. With the use of the IntranetBOX, the ROI is achieved quickly and the investment costs are reduced to a minimum. The majority of the project implementation is covered with the "Out of the BOX" standard functions . It follows from this, the reduction in staff resources for project implementation. -
21
AVANU WebMux
AVANU
AVANU’s WebMux Network Traffic Manager (“WebMux”) is a cost-effective full-featured enterprise-class load balancing solution. WebMux integrates application delivery network (ADN) and global server load balancing (GSLB) with its built-in FireEdge™ for Apps Web Application Firewall (WAF). In development since 1987, WebMux is developed using intensive algorithms for sophisticated network designs that require load balancing flexibility to meet and manage the most stringent network traffic demands. It manages, controls, and secures local network traffic for high availability of applications assuring reliable peak performance with geographic disaster recovery and affinity services and enhanced applications security firewall features. The user-friendly menu-driven interface makes WebMux fast to deploy and easy to manage. -
22
ArcServe Live Migration
ArcServe
Migrate data, applications and workloads to the cloud without downtime. Arcserve Live Migration was designed to eliminate disruption during your cloud transformation. Easily move data, applications and workloads to the cloud or target destination of your choice while keeping your business fully up and running. Remove complexity by orchestrating the cutover to the target destination. Manage the entire cloud migration process from a centralconsole. Arcserve Live Migration simplifies the process of migrating data, applications and workloads. Its highly flexible architecture enables you to move virtually any type of data or workload to cloud, on-premises or remote locations, such as the edge, with support for virtual, cloud and physical systems. Arcserve Live Migration automatically synchronizes files, databases, and applications on Windows and Linux systems with a second physical or virtual environment located on-premises, at a remote location, or in the cloud. -
23
FortiGate SWG
Fortinet
Secure Web Gateway (SWG) solutions, enterprise-class protection against internet-borne threats. Secure Web Gateway (SWG) solutions use web filtering to enforce company Internet access policies. They also filter unwanted software, especially malware, from user-initiated Internet connections. SWGs are hugely important as enterprises have continued to evolve their WAN Edge. Applications are rapidly migrating to the cloud, and the attack surface at remote sites and branch locations continues to increase. Security risks are especially high for web-based traffic, and as attack techniques become more advanced, organizations need an integrated approach to secure against external and internal risks. An SWG solution should include URL filtering, application control, deep HTTPS/SSL inspection, data loss prevention and remote browser isolation capabilities. Fortinet's SWG provides flexible deployment options, including explicit, transparent, and inline modes. -
24
KeyTalk
KeyTalk
KeyTalk is independent of Certificate Authorities and linked to a large number of public CAs both GMO GlobalSign and Digicert QuoVadis. Switching between CAs is simple and easy, even when thousands of certificates and end-points are involved. A vendor lock-in is therefore no longer the case. KeyTalk contains an internal CA for the generation of private certificates and keys. Did you use previously expensive public certificates for internal purposes? Or did you run into the limited functionality of Microsoft CS and other private CAs? Then, you will like our internal CA, private PKI certificate issuance. KeyTalk keeps track of the lifecycle of your certificates in a fully automated way. This way, you always have a complete and up to date overview of all your certificates, including the certificate name, SAN and validity. Also, things like used crypto keys and algorithms of internal and external certificates can be included. -
25
MaxPatrol
Positive Technologies
MaxPatrol is made for managing vulnerabilities and compliance on corporate information systems. Penetration testing, system checks, and compliance monitoring are at the core of MaxPatrol. Together, these mechanisms give an objective picture of the security stance across IT infrastructure as well as granular insight at the department, host, and application level, precisely the information needed to quickly detect vulnerabilities and prevent attacks. MaxPatrol makes it a cinch to keep an up-to-date inventory of IT assets. View information about network resources (network addresses, OS, available network applications and services), identify hardware and software in use, and monitor the state of updates. Best of all, it sees changes to your IT infrastructure. MaxPatrol doesn't blink as new accounts and hosts appear, or as hardware and software are updated. Information about the state of infrastructure security is quietly collected and processed. -
26
Airlock
Airlock
Airlock's Secure Access Hub protects applications, APIs and data from identity theft and the most common attacks on Web applications. Security meets convenience, Airlock offers your customers a customer journey without media breaks with single sign-on, social registration, comprehensive user self-services and consent management. Acting in line with the market means reacting quickly. The Airlock Secure Access Hub therefore provides all important security functions such as registration, authentication and self services. So you can concentrate all your IT resources on your business processes. The Airlock Secure Access Hub helps to meet all international compliance standards - from GDPR over PSD2, PCI-DSS, OWASP to MAS. The upstream enforcement point for access policies onto applications and services allows compliance with regulations without having to make adjustments in each individual application. -
27
StarWind Virtual SAN (VSAN)
StarWind
StarWind VSAN has been designed with small businesses’ needs and restricted IT budgets in mind. It pulls out close to 100% of the IOPS from your existing raw storage —no crazy expensive hardware required. Licensing is flexible and transparent without any pitfalls or feature paywalls. Virtual SAN from StarWind ensures high uptime and fault tolerance starting with just two nodes. You don’t need a witness if you don’t want to have one. Your IT environment won’t skip a beat even if you lose an entire node plus one individual storage device, HDD or SSD. Scale up, down, or out when and how you need it. Operate your HCI clusters through a unified StarWind web UI. Our engineers will assist in migrating your existing workload to StarWind at no extra cost! Our solution has been specifically designed to bring enterprise-grade features to SMBs, which do not operate corporate budgets. StarWind VSAN requires no witnesses and brings all the promised benefits in a two-node scenario already. -
28
Diladele Web Filter
Diladele
User tries to access a web site in the Internet. Browser connects to that site either directly or using explicitly configured proxy settings. Requests and remote site responses get into Squid, are authenticated and redirected to Web Safety ICAP filter running either locally or remotely. Requests and responses are analyzed and access is allowed or denied based on configured policy settings. Information about request and response is stored in the database. Web Safety is an ICAP web filter that directly plugs into Squid proxy. This allows it to filter URLs and do deep content inspection of encrypted HTTPS traffic. Encrypted explicit content is blocked easily. Performs deep content inspection of web pages and blocks everything containing adult explicit language and links to questionable content. General purpose web sites (Google Search, Google Images, Bing or YouTube) are filtered as well and all inappropriate content is blocked. -
29
Unitrends Security Manager
Unitrends
Over 70% of all cyber security incidents are caused by internal security threats – misconfigurations, unauthorized logins, gaps in backup – that no firewall or anti-virus app can prevent. Attackers can capitalize on internal gaps to steal data and wreak havoc undetected. Stop them in their tracks with Unitrends Security Manager, which alerts you to threats before hackers gain a foothold. Unitrends Security Manager scans your servers, data, and network every 24 hours and automatically alerts you to internal threats. Alerts are aggregated in an easy-to-use report that can be sorted by priority/severity, or by the type of issue. Alert reports can be sent to your choice of emails, including your ticketing system. Unitrends Security Manager uses “smart tags,” a feature that allows it to adapt to each unique client. Smart tags enrich the detection system by adding information about specific users, assets, and settings. -
30
UnixWare
Xinuos
UnixWare® 7.1.4 is the latest release of Xinuos’s award winning, state of the art UNIX® operating system. It is the mature and proven operating system to support your most critical line of business applications, yet is affordably priced to host all computer needs. It supports the newest industry standard hardware platforms and peripherals and contains even more of the high performance, scalability and reliability features that you have come to expect from UnixWare. As an added bonus, the default configurations of the most popular editions have been adjusted to provide even more value for your money. New installations of UnixWare 7.1.4 as well as upgrades immediately benefit from the additional value in UnixWare 7.1.4. A new, low-entry-level edition has been added and is configured and priced for low budget pilot projects, edge of network services and line of business applications for small companies. -
31
Palo Alto Networks Panorama
Palo Alto Networks
Panorama™ offers easy-to-implement, centralized management features that provide insight into network-wide traffic and simplify configurations. Create and edit security rules in accordance with your organization’s security policy, across your firewall deployment, from one central location. Gain visibility and actionable insights into network traffic and threats via the Application Command Center (ACC) for comprehensive security management and protection. Leverage the automated correlation engine to reduce data clutter so you can identify compromised hosts and surface malicious behavior more quickly. Manage up to 5,000 Next-Generation Firewalls, or use the Panorama Interconnect plugin to centralize configuration management for tens of thousands of devices. Panorama simplifies security with an intuitive UI that can be used to monitor, configure and automate security management. -
32
BT Diamond IP
BT For Global Business
Flexible, scalable, extensible IP address management products and managed services. Diamond IP is our IP address management (IPAM) solution which streamlines management of your entire IPv4 and IPv6 address lifecycle across your premises, branch remote, private and public cloud domains. We offer software, hardware and virtual appliance (private and public) products, as well as managed IPAM services. We facilitate multi-cloud IPAM with virtual appliances for AWS, Azure, Oracle VM, VMware, Hyper-V and others. And our cloud automation appliance dynamically automates the assignment and tracking of private and public cloud instance IP addresses and DNS names. Our DNS security products supplement your defense in depth security strategy at the DNS layer. We serve global multinational organizations around the world with our security, cloud and networking services. We can help your organization to move to the cloud; turn collaboration into part of your culture; improve your contact centres. -
33
BlueCat Gateway
BlueCat
Provide self-service capabilities to end users making IT more accessible across the enterprise. Access a robust automation library that facilitates complex automation tasks and integrates with 3rd party solutions to extend the value of existing solutions. Automate the stand-up and tear-down of cloud and on-premises resources, enabling IT to respond faster to requests. Extend visibility from the data center to the cloud through discovery and continuous synchronization of cloud-based IP and DNS-resources. Reduce time to remediate problems and shorten investigations by automating the reconciliation of IP addresses and DNS records. Accelerate application delivery and eliminate outages, with centralized management and integration with native DNS and IP configuration services in public clouds. Align custom network emergency plans with flexible control over manual or automated DNS failover. -
34
Useit Fax Server
Alhambra
Useit Fax Server v9 is a powerful .NET fax server featuring fax/mail for Office 365, Gmail, and Microsoft Exchange, MFP fax integration, web-based administration – all backed by stellar support. Useit Fax Server v9 is a powerful .NET fax server featuring fax/mail for Office 365, Gmail, and Microsoft Exchange, MFP fax integration, web-based administration – all backed by stellar support. Keep the initial cost down and scale your fax server as your business grows. Adding lines and DIDs is simple and quick. Consult with a solution expert today to design a fax server solution that’s right for your needs and easy on your budget. Comprehensive web-based reporting on fax metrics. Customize email templates and add your logo for personalized branding. -
35
Carbonite Migrate
Carbonite
Carbonite Migrate allows you to easily migrate physical, virtual and cloud workloads to and from any environment with minimal risk and near-zero downtime. Options for finely tuned automation help orchestrate every stage of the process. Replicate data continuously to minimize downtime and enable fast cutover. Perform unlimited testing of the new environment without disrupting operations. Reduce downtime to minutes or seconds as you cut over to the new server. After installing Carbonite Migrate, the administrator selects the source and target servers through the console. The administrator chooses how to migrate data, with options from fully automated cloud orchestration workflows to DIY with our robust SDK. Offers freedom from lock-in to any specific hypervisor, cloud vendor or hardware. Cutting over to the target can be initiated manually or automated immediately upon completion of initial synchronization. -
36
Hosting Controller
Hosting Controller
All enterprises and government organizations in the world need to put a 'control panel' in front of their software applications. Providing full lifecycle support to take an organization through its journey on 'digital transformation'. Designed to automate all aspects of your business including service provisioning, billing, metering, customer management and on-boarding of new services. Offer a unique blend of on-premises and cloud products through a single interface. Sell single billable service bundles as a Microsoft CSP™. Our 'private cloud control panel' brings the cloud to where your data is, on-premise or in your own data center. Think of it as your own Office 365™ for your Microsoft applications or Azure™ or AWS™ for your virtual machines and a control panel for hundreds of other applications. Single programmable access through a vast REST API. Single audit trail for all 'control' activity performed. -
37
R&S®Browser in the Box
Rohde & Schwarz Cybersecurity
R&S®Browser in the Box from Rohde & Schwarz Cybersecurity prevents malware from entering your PC and your infrastructure. The solution takes an innovative approach and fully separates the browser from a computer‘s operating system. It runs on a virtual machine (VM) for complete isolation at the computer level, keeping malware away from the user‘s device and the corporate’s network. Browser in the Box offers proactive protection against cyberattacks. Thanks to the secure separation of the browser from the rest of the PC, you and your corporate network are protected against Trojan horses, ransomware, ATPs and zero-day attacks. Java, JavaScript, Flash and the opening of dangerous links are no longer a threat. -
38
Tintri IntelliFlash
Tintri
Forward-looking enterprises choose Tintri IntelliFlash because it is the industry’s most versatile storage portfolio and the easiest to manage, with generalist-friendly administration and a single, all-inclusive license. You can maximize operational efficiency and TCO savings by running all your apps on a single unified storage system with concurrent multimedia and multi-protocol support. AI-driven analytics and autonomous workload optimization give you effortless IT productivity and an exceptional user experience. Cloud-based intelligent analytics for IntelliFlash collects millions of data points from participating systems, including capacity usage, configuration details, and comprehensive system health and performance. AI-driven data analysis then detects issues and identifies patterns that can predict trends far in advance and help you make better decisions and maximize resource efficiency. -
39
QANplatform
QANplatform
Developers and enterprises can build Quantum-resistant smart-contracts, DApps, DeFi solutions, NFTs, tokens, Metaverse on top of the QAN blockchain platform in any programming language. QANplatform is the first Hyperpolyglot Smart Contract platform where developers can code in any programming language and also get rewarded for writing high-quality code reusable by others. The Quantum threat is very real. Existing chains can not defend against it. QAN is resistant against it from ground up, your future funds are safe. Quantum-resistant algorithms — also known as post-quantum, quantum-secure, or quantum-safe — are cryptographic algorithms that can fend off attacks from quantum computers. Quantum-resistant algorithms — also known as post-quantum, quantum-secure, or quantum-safe — are cryptographic algorithms that can fend off attacks from quantum computers. -
40
Catalogic DPX
Catalogic Software
Reliable, rapid, and low-cost backup and recovery. Protect and recover your data from human errors, disasters, and ransomware attacks. Fast recovery-in-place from disk, tape and cloud. Agentless backup for virtual environments enhancements including single file recovery to restore specific files or directories from VMware and Microsoft Hyper-V agentless backups. Enhancements to vStor, our software-defined backup appliance, including appliance configuration via the HTML5 interface, replication management, and S3 Object Lock for protecting cloud backups against early deletion and ransomware. More cloud storage backup and archive targets including Backblaze B2 Cloud Storage with S3 Object Lock, and Amazon S3 Glacier and Glacier Deep Archive support. -
41
Commvault Backup & Recovery
Commvault
Ensure data availability for all workloads across cloud and on-prem environments. Wherever your data resides, ensure availability via a single interface with Commvault® Backup & Recovery. Say goodbye to costly data loss scenarios, segregated data silos, missing recovery SLAs, and inefficient scaling. Empower your team to do more. Comprehensive workload coverage (files, apps, databases, virtual, containers, cloud) from a single extensible platform and user interface. Rapid, granular recovery of data and applications, including instant recovery of virtual machines. Easily back up, recover, and move data and workloads to/from/within/between clouds. High-performance backups via storage integrations. Built-in ransomware protection including anomaly detection and reporting. Reduce costs with minimal infrastructure requirements in the cloud or on-premises. Optimize cloud vs on-premises location of data and workloads via policy-driven automation. -
42
PetaSAN
PetaSAN
PetaSAN is a scale-out active/active storage solution offering massive scalability and performance. PetaSAN uses modern cloud based technologies to provide the elasticity and agility to scale up the storage cluster simply by adding more nodes; this can be done at any time and in a truly non-disruptive manner. Although PetaSAN uses different underlying technologies that are inherently complex, it provides an integrated end to end solution that is very easy to install and operate. PetaSAN can be operated by non-Linux admins through its easy to use graphical interfaces while still allowing Linux experts full control if they wish. PetaSAN brings proven technologies powering many of today’s largest clouds to the datacenter with point and click interfaces. At the storage level PetaSAN relies on the Ceph storage engine. Ceph is the leading edge open source SDS cloud storage solution powering many of today’s private clouds and public clouds. -
43
LogMan.io
TeskaLabs
TeskaLabs Logman.io is a modern and effective tool for log management, collection, archiving, and log analysis. Scalable Log Management can be easily upgraded to the full-scale tool TeskaLabs SIEM (security information and event management). Be always one step ahead of all potential threats and achieve a total overview of the security of your IT infrastructure. Thanks to timely and clear threat detection, TeskaLabs LogMan.io protects important data and sensitive information. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. LogMan.io ensures regulatory compliance with legislation covering cyber security and GDPR. Logman.io can grow with your needs. It can be easily upgraded to TeskaLabs SIEM. You can promptly get a central essential overview of the entire IT infrastructure, a full-scale tool for threat modeling, risk management, and vulnerability scanning. -
44
TeskaLabs SIEM
TeskaLabs
A state-of-the-art tool for security information and event management. A security surveillance tool that allows you to automatically monitor, correlate, and evaluate security events and create reports in real-time. TeskaLabs SIEM will bring a central overview of the entire company infrastructure and early detection helps eliminate risks and their possible effects on the operation of your company. TeskaLabs SIEM will always be one step ahead of potential threats and you will gain absolute supervision. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. TeskaLabs SIEM ensures regulatory compliance with legislation covering Cyber Security, GDPR, and ISO 27001:2013. Automated real-time detection and reporting of known incidents and anomalies will allow you to quickly react and prioritize the solution to individual incidents. Time savings allow you to proactively search for potential threats. -
45
Unisys ClearPath Forward MCP
Unisys
For computing requirements that demand the utmost in security, resiliency, availability and scalability combined with optimal business agility, ClearPath Forward provides the foundation for simplification, controlling costs, and digital transformation. Augment staff, optimize performance and speed digital transformation of your ClearPath Forward environment with a managed service offering and cloud hosting managed, maintained and optimized by Unisys. Build a clear, actionable strategy that outlines how to evolve your applications in response to new demands with ClearPath Forward Advisory Services and ClearPath Forward Application Evolution Services. Benefit from a full range of advisory and implementation services to streamline the transition of your ClearPath Forward environment to private or public cloud. -
46
Accops Digital Workspace
Accops
The workspace has gone hybrid. A large segment of the workforce is working from home today, accessing business applications and data from various locations, using varied devices and in different ways. Thus, organizations all over the globe are looking for ways to transition from a hardware-based IT infrastructure into a completely software-defined infrastructure. They are trying to enable their workforce to be productive, secure, and seamless, regardless of their locations, or the devices and networks they use. But data security concerns, IT infrastructure complexities, and increased costs associated with setting up a digital work infrastructure pose many hurdles for organizations. Accops Digital Workspace provides a comprehensive, zero-trust-based end-user computing solution, enabling secure and instant access to business applications from anywhere, any device, and any network. The Accops solution suite includes end-user computing virtualization. -
47
Accops HyWorks
Accops
Accops HyWorks gives the modern-day professional, flexibility, and agility to work anywhere, anytime, and on any device, enhancing job satisfaction and engagement. This comprehensive product simplifies the way the IT team manages and secures apps, devices, and networks, to provide safe and seamless access to all the tools that employees need to perform at their best. And the centralized endpoint management makes it easy to control and manage all devices, virtual desktops, and applications from a central location. HyWorks not only helps you create a secure work environment but also reduces complexities, allowing your workforce to focus their creativity on core business activities, rather than worrying about system glitches, software updates, or cyber threats, thereby increasing productivity and reducing costs. Control every device, app & OS in your network to prevent security breaches, by virtualizing & delivering desktop apps from the centralized datacenter. -
48
CipherTrust Tokenization
Thales Cloud Security
CipherTrust Tokenization dramatically reduces the cost and effort required to comply with security policies and regulatory mandates like PCI DSS while also making it simple to protect other sensitive data including personally identifiable information (PII). While there are no tokenization standards in the industry, most tokenization solutions fall into one of two architectures: vaultless- or vaulted tokenization Both secure and anonymize sensitive assets. Tokenization software can reside in the data center, big data environments or the cloud. Tokenization can remove card holder data from PCI DSS scope with minimal cost and effort, enabling organizations to save on costs associated with compliance with the industry standard. Modern IT architectures require both use and protection of personally identifiable information (PII). With CipherTrust tokenization, PII protection is gained without encryption key management required by the software developer. -
49
Barracuda Intronis Backup
Barracuda Networks
Barracuda Intronis Backup – MSP is a software-only BDR solution designed to offer value to your customers by protecting what matters most, while creating new opportunities to expand your margins and grow your business. Intronis Backup and the ECHOplatform is a software-only solution that goes beyond file-and-folder and delivers secure hybrid local and cloud backup services that offer flexible, comprehensive data protection — complemented by a simple pricing structure and a centralized management portal. Intronis Backup is available at a fixed cost per SMB site, creating cost certainty for MSPs. Fixed pricing also makes it easier for MSPs to build margins and makes data protection a growth driver. Intronis Backup includes management and reporting tools you need to support SMBs effectively. And you can maximize your efficiency thanks to our tight integrations with core MSP business tools. -
50
Asigra Tigris Backup
Asigra
Asigra Tigris protects your backups from today’s new breed of attacks, improving your odds of data recovery while being easier to manage than traditional backup software. With a unique network-based data security architecture, Asigra provides inline advanced antimalware, encryption, authentication, and obfuscation features to do what traditional backup software can’t do. Protect your backup data from determined attackers so you avoid paying ransoms. Asigra deploys to the network quickly, without requiring endpoint agents, enabling smoother updates, reduced administration, and a minimized security footprint. Whether you are recovering last night's file for a user or your entire data center, you can be confident that your restores will succeed with advanced recovery capabilities. Incremental forever lets you restore backups from any point in time. Autonomic healing repairs corrupted backups automatically.