47 Integrations with Nutanix AHV Virtualization

View a list of Nutanix AHV Virtualization integrations and software that integrates with Nutanix AHV Virtualization below. Compare the best Nutanix AHV Virtualization integrations as well as features, ratings, user reviews, and pricing of software that integrates with Nutanix AHV Virtualization. Here are the current Nutanix AHV Virtualization integrations in 2024:

  • 1
    Inuvika OVD Enterprise
    Our digital workspace platform, OVD Enterprise, delivers virtualized Windows and Linux apps and desktops (VDI) to any device. Built on Linux, it reduces Windows licensing requirements, needs less infrastructure and reduces total costs by 60% compared to Citrix or VMware Horizon (now Omnissa). It can be deployed on-premises or through any cloud provider. OVD is also available as a service through our network of Managed Services Providers. . OVD is easy to install and manage and it delivers a fast user experience on any device. It integrates with today's leading enterprise standards, including any directory service, storage or hypervisor. Key Features: -Deliver Windows and Linux apps and desktops -Use any device - macOS, Windows, Linux, iOS/Android, Chromebook, Raspberry Pi, or any HTML5 Web browser. -Full multi-tenancy support -Full USB redirection -Integrated Two-Factor Authentication -Integrated Gateway enables secure remote access without a VPN - Single Admin console
    Leader badge
    Starting Price: $7.40/concurrent user/month
    Partner badge
    View Software
    Visit Website
  • 2
    Parallels RAS

    Parallels RAS

    Parallels

    Parallels® Remote Application Server (RAS) is a remote work solution that provides secure virtual access to business applications and desktops on any device or OS—from anywhere. The platform offers an agile, cloud-ready foundation and end-to-end security fueled by a centralized management console with granular policies. Companies can leverage on-premises, hybrid, or public cloud deployments and integrate with existing technology like Microsoft Azure and AWS. Parallels RAS aims to give organizations the flexibility, scalability, and IT agility to adapt to changing business needs. Parallels RAS offers a single, full-featured licensing model that includes 24/7 support and access to product training.
    Starting Price: $120 US/year/concurrent user
    View Software
    Visit Website
  • 3
    Pandora FMS

    Pandora FMS

    Pandora FMS

    With more than 50,000 customer installations across the five continents, Pandora FMS is a truly all-in-one monitoring solution, covering all traditional silos for specific monitoring: servers, networks, applications, logs, synthetic/transactional, remote control, inventory, etc. Pandora FMS gives you the agility to find and solve problems quickly, scaling them so they can be derived from any source, on-premise, multi cloud or both of them mixed. Now you have that capability across your entire IT stack and analytics to find any problem, even the ones that are hard to find. Thanks to more than 500 plugins available, you can control and manage any application and technology, from SAP, Oracle, Lotus, Citrix or Jboss to VMware, AWS, SQL Server, Redhat, Websphere, etc.
    Leader badge
    Starting Price: €18/month
  • 4
    Pliant

    Pliant

    Pliant.io

    Pliant’s solution for IT Process Automation simplifies, streamlines, and secures how teams build and deploy automation. Reduce human error, ensure compliance, and elevate your efficiency, with Pliant. Ingest existing automation and write new automation with single-pane orchestration. Ensure compliance using consistent, practical built-in governance. Pliant has abstracted thousands of vendor APIs to create intelligent action blocks allowing users to drag-and-drop blocks, rather than writing and rewriting lines of code. From a single platform, citizen developers are able to build consistent and meaningful automation across platforms, services, and applications in minutes — maximizing value across the entire technology stack in one place. ​With​ ​our​ ​ability​ ​to​ ​add​ ​new​ ​APIs​ ​in​ ​15​ ​business​ ​days,​ ​anything that​ ​is​ ​not​ ​already​ ​out​ ​of​ ​the​ ​box​ ​will​ ​be​ ​in​ ​an​ ​industry​ ​leading​ ​timeframe.
  • 5
    eG Enterprise

    eG Enterprise

    eG Innovations

    IT performance monitoring is not about monitoring CPU, memory and network resources any more. eG Enterprise makes user experience the centerpiece of your IT monitoring and management strategy. With eG Enterprise, you can measure the digital experience of your users, get deep visibility into the performance the entire application delivery stack — from code to user experience, and data center to cloud — from a single pane of glass, correlate performance across domains and pinpoint the root-cause of problems proactively. Machine learning and analytics capabilities embedded in eG Enterprise enable IT teams make intelligent decisions regarding right-sizing, optimization and planning for future growth. The result: happy users, enhanced productivity, improved IT efficiency and tangible business ROI. eG Enterprise is available for installation on-premise and as a SaaS solution. Start a free trial today.
    Starting Price: $1,000 per month
  • 6
    Quest KACE

    Quest KACE

    Quest Software

    KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.
    Starting Price: As low as $3/mo/device
  • 7
    SAP Data Warehouse Cloud
    Connect data with business context and empower business users to unlock insights with our unified data and analytics cloud solution. SAP Data Warehouse Cloud unifies data and analytics in a cloud solution that includes data integration, database, data warehouse, and analytics capabilities to help you unleash the data-driven enterprise. Built on the SAP HANA Cloud database, this software-as-a-service (SaaS) empowers you to better understand your business data and make confident decisions based on real-time information. Connect data across multi-cloud and on-premises repositories in real-time while preserving the business context. Get insights on real-time data and analyze data with in-memory speed, powered by SAP HANA Cloud. Empower all users with self-service ability to connect, model, visualize and share their data securely, all in an IT governed environment. Leverage pre-built industry and LOB content, templates and data models.
  • 8
    NAKIVO Backup & Replication
    NAKIVO Backup & Replication offers complete data protection for virtual, physical, cloud, and SaaS environments including VMware vSphere, Microsoft Hyper-V, Nutanix AHV, Proxmox VE, Amazon EC2, Windows and Linux physical machines and servers, files shares/NAS, Oracle database, and Microsoft 365. You can install the NAKIVO solution on Linux and Windows OS, or deploy it as a pre-configured virtual appliance (VA) or Amazon Machine Image (AMI). You can also install the solution on NAS to create a cost-efficient and fast backup appliance. NAKIVO Backup & Replication includes advanced disaster recovery functionality with Site Recovery and Real-Time Replication for VMware. In addition, you can protect backups from ransomware using built-in cybersecurity features like immutability and pre-recovery malware scans.
    Starting Price: $229/ socket; $25 workload/y
  • 9
    Edgenexus Load Balancer (ADC/WAF/GSLB)
    Choose us because we offer the easiest to use technology without sacrificing features or performance. We back this up with outstanding support and care, delivered under a fair and cost effective pricing model Our technology is used by the smallest startups with big ideas and small budgets all the way to global enterprises and anything in between. We love them all the same! Easy to use Load balancing, WAF, GSLB and SSO/Pre-Authentication. It is also the Only true ADP Application Delivery Platform where the functionality and lifespan can be enhanced using the app store or applications that you develop in house.
    Starting Price: $50
  • 10
    NorthStar Navigator

    NorthStar Navigator

    NorthStar.io, Inc.

    NorthStar is redefining Risk-Based Vulnerability Management with simple, contextual vulnerability prioritization for easier remediation. Common challenges NorthStar addresses are listed below: • Prioritize issues that should be addressed first in order to make the best use of limited resources. • Address lingering exposures that could impact critical business services, applications, and data stores. • Bridge the visibility gap and discrepancies that exist between vulnerability assessment and patch management. • Track reduction in risk over time and validate the most important issues are being addressed first. • Deliver a complete view of their environment – all assets, vulnerabilities and exposures. • Eliminate manual processes and unnecessary spreadsheet work.
    Starting Price: $8 per device
  • 11
    MinerEye DataTracker
    MinerEye’s DataTracker enables organizations to overcome the information governance and protection challenge. It automatically scans, indexes, analyzes, virtually labels and categorizes every piece of unstructured and dark data contained in the organization’s data repositories. With proprietary Interpretive AI™, machine learning, and computer vision, the solution locates relevant files out of the billions that are stored, accurately evaluates them, qualifies them by significance and purpose, and automatically sends alerts with next best action recommendations in cases of conflicts, duplications, or potential violations. This way, data protection is profoundly enhanced while risk and operational costs are reduced.
    Starting Price: $2000/1TB/month
  • 12
    VaultCore

    VaultCore

    Fornetix

    Fornetix® delivers VaultCore™, a highly scalable, next-generation, patented enterprise key management solution built to fully enable encryption to protect your data by seamlessly integrating with existing platforms, automating policy, and empowering administrators with an organized, centralized control that is easily exercised across all environments. Request a demo and experience VaultCore's: - Rapid, seamless integration with existing technology - Separation of Duties (a best practice) - Centralized Control of policy through powerful automation - Strengthened security of data at rest, in motion and in use - Drastic reduction in costs associated with data breaches — lost business, recovery time, reputation damage - Simplified compliance and regulatory enforcement - Scalable to over 100 million keys (more than enough to meet any industry's or government's needs) - Reporting abilities to meet compliance needs - Ease of use
    Starting Price: $1,118 per year
  • 13
    Leostream

    Leostream

    Leostream Corporation

    Connect to anything - anywhere, any time, and from any device, quickly and securely. A modern web-based UI is your centralized hub for all your remote resources. Management wants Windows, designers want macOS, and developers want Linux - support multi-OS environments with ease. Leostream works seamlessly with Teradici Cloud Access Software and PCoIP Remote Workstation Cards, providing high-quality graphics for applications running in the datacenter or the cloud. Together, Leostream and Scale Computing offer a complete VDI solution that is simple to set up, easy to manage, and cost-effective for small business. Leostream manages user-to-resource assignments and connections in large-scale enterprise environments from wherever your users roam. Build a VDI or DaaS solution your clients will love with Leostream. Leostream provides all the tools you need to build and deploy a VDI.
    Starting Price: $7.50 per user per month
  • 14
    VyOS

    VyOS

    VyOS

    Democratizing how we access networks through a universal router and open source software. Our vision at VyOS is to dramatically change how we access networks so that we can all build the solutions we always dreamed of, without restrictions, limitations, or prohibitive costs. We fundamentally believe that internet access is as vital to our human development as air, food, water, and healthcare. Built by engineers for engineers, VyOS is an open source software company that democratizes how we access networks so that the many, not the few, benefit from building solutions without limitations and prohibitive fees. We do this as VyOS through our open source software and virtual platforms. Stateful firewalls, zone-based firewall, all types of source and destination NAT (one to one, one to many, many to many). The entire codebase and build toolchain are available to everyone for auditing, building customized images and contributing.
    Starting Price: $1000
  • 15
    SAP Data Intelligence
    Turn data chaos into data value with data intelligence. Connect, discover, enrich, and orchestrate disjointed data assets into actionable business insights at enterprise scale. SAP Data Intelligence is a comprehensive data management solution. As the data orchestration layer of SAP’s Business Technology Platform, it transforms distributed data sprawls into vital data insights, delivering innovation at scale. Provide your users with intelligent, relevant, and contextual insights with integration across the IT landscape. Integrate and orchestrate massive data volumes and streams at scale. Streamline, operationalize, and govern innovation driven by machine learning. Optimize governance and minimize compliance risk with comprehensive metadata management rules. Connect, discover, enrich, and orchestrate disjointed data assets into actionable business insights at enterprise scale.
    Starting Price: $1.22 per month
  • 16
    WatchTower Security Management App
    Monitor your network with Check Point’s WatchTower Security Management app and quickly mitigate security threats on the go with your mobile phone. The intuitive WatchTower Security Management App provides real-time monitoring of network events, alerts you when your network is at risk, enables you to quickly block security threats, and configure the security policy for multiple gateways. View the devices connected to your network and any potential security threats. Real-time notification of malicious attacks or unauthorized device connections. Quickly block malware-infected devices and view infection details for further investigation. Customize notifications for your top-priority security events. View all security events by category and drill down for further information. Configure the security settings for multiple gateways. Manage advanced security policy settings securely via web user interface.
  • 17
    Multi-Domain Security Management
    Multi-Domain Security Management delivers more security and control by segmenting security management into multiple virtual domains. Businesses of all sizes can easily create virtual domains based on geography, business unit or security function to strengthen security and simplify management. Enable granular and isolated role-based administration of a multi-tenant security management architecture. Single security management configuration for VPN, Firewall, IPS, and other protections. Create, view and control all network security management domains from a single console. Create and centrally manage multiple administrators in the multi-domain security management environments. Give administrators permission to manage specific domains or different aspects of the multi-domain system. Allow multiple administrators to work on different security management domains simultaneously.
  • 18
    SysTrack

    SysTrack

    Lakeside Software

    Lakeside Software is a leader in digital experience monitoring. We develop software that provides the visibility IT teams need to design and support productive digital workplaces. Customers use our technology to perform workplace analytics, IT asset optimization, remote work management, and AIOps. Our product, SysTrack, is a digital experience monitoring solution that gathers and analyzes data on everything that may impact end-user experience and business productivity. For more information, visit www.lakesidesoftware.com.
  • 19
    Stratodesk NoTouch
    Stratodesk NoTouch is the #1 Thin Client endpoint OS and management solution in the world. Comprised of both NoTouch OS and NoTouch Center, Stratodesk NoTouch lets you transform any PC, Thin Client, Laptop or Raspberry Pi device into a secure and centrally managed Thin Endpoint. You can also instantly deploy NoTouch OS onto thousands of devices and manage them from oStratodesk NoTouch is the #1 Thin Client endpoint OS and management solution in the world. Comprised of both NoTouch OS and NoTouch Center, Stratodesk NoTouch lets you transform any PC, Thin Client, Laptop or Raspberry Pi device into a secure and centrally managed Thin Endpoint. You can also instantly deploy NoTouch OS onto thousands of devices and manage them from one browser. NoTouch OS is the minimal footprint OS that installs from your server onto your PC, Laptop, Thin Client, or Raspberry Pi Device. NoTouch Center is the #1 endpoint management software for your VDI endpoints.
  • 20
    Thunder TPS

    Thunder TPS

    A10 Networks

    Used by the top service providers and online gaming companies, Thunder TPS provides scalable and automated DDoS protection powered by advanced machine learning to detect and mitigate attacks. Multi-modal source-based defense pinpoints attackers without damaging users. 5-level adaptive mitigation policy, zero-day Automated Protection (ZAP), actionable distributed denial-of-service weapons Intelligence at a scale of 96M-entry black/white lists. Flexible and robust Distributed Denial of Service (DDoS) protection, with a wide range of hardware and software deployment models to meet your exact needs. High precision, automated DDoS mitigation solution is delivered as hardware or virtual appliances ranging from 1 Gbps to 500 Gbps. High-performance Netflow, Sflow, IPFIX-based DDoS detector for a complete reactive cyber attack defense solution. Available as a standalone appliance or integrated with aGalaxy 5000.
  • 21
    Actian Zen Edge Data Management
    Edge applications and devices increasingly rely on AI to improve automation and end-user decision support – whether that be human or machine – in stand-alone, peer-to-peer, local network, cloud or a mixed environment. The underlying edge data management must be capable of leveraging a variety of hardware architectures, operating environments, networks, communications interfaces, and programming and scripting languages for the applications that make use of these resources. The Actian Zen Edge Data Management solution delivers against this broad and demanding set of requirements. Single, secure, scalable architecture supports concurrent read and write, NoSQL and SQL across all popular embedded environments. Faster than leading purpose-built DBs at time-series, JSON-based or BLOB document store, and orders of magnitude faster than SQLite. Provides AES 256-bit Encryption for data at rest and transports that data without ETL between devices, gateways, branches and cloud.
  • 22
    Veeam ONE

    Veeam ONE

    Veeam

    With insights for Veeam® Backup & Replication™ and Veeam Agents, as well as VMware vSphere, Microsoft Hyper-V and Nutanix AHV, Veeam ONE™ delivers deep, intelligent monitoring, reporting and automation through interactive tools and intelligent learning, identifying and resolving real customer problems before they begin. Veeam Availability Suite™ attaches the monitoring capabilities of Veeam ONE to the powerful data protection features of Veeam Backup & Replication in one Enterprise bundle to meet both your protection and analytics needs. Veeam Backup & Replication provides centralized data protection and management for cloud, virtual and physical workloads. Veeam’s core capabilities, backup and recovery, along with replication and failover, combine to form the cornerstone of Veeam’s flagship products. Proactively mitigate potential threats to your environment before they develop into real problems.
  • 23
    GigaSECURE

    GigaSECURE

    Gigamon

    The GigaSECURE® Security Delivery Platform is a next-generation network packet broker focused on threat prevention, detection, prediction and containment. The right tools get the right traffic at the right time, every time. Enable network security tools to keep up with increasing network speed. Gain insight into network traffic. Optimize and deliver relevant data for tool consumption. Reduce tool sprawl and lower costs. Efficient prevention coupled with rapid detection and containment improves your overall security posture. Threats don't stand a chance. GigaSECURE enables security teams to obtain broad access to and control of network data, no matter where it resides. It can be customized to extract specific application sessions, metadata and decrypted traffic. In this architecture, security tools can operate inline or out-of-band at peak performance without compromising network resiliency or speed.
  • 24
    Junos Traffic Vision

    Junos Traffic Vision

    Juniper Networks

    Junos Traffic Vision is a licensed traffic sampling application for MX Series 3D Universal Edge Routers. It provides details on network traffic flows that is useful for a wide variety of operations and planning activities. Junos Traffic Vision monitors packets as they are processed by the router, and captures details such as source and destination addresses, packet and byte count information. These details are aggregated and exported in a standards-based format for analysis and presentation by Juniper and third-party-based tools that support usage-based accounting, traffic profiling, traffic engineering, attack and intrusion detection, and SLA monitoring. Implemented inline and on service cards that provide high performance and scale, Junos Traffic Vision can be deployed in both active and passive configurations and can take place alongside lawful intercept filtering and port mirroring without impacting performance.
  • 25
    Check Point Infinity
    Organizations frequently implement multiple cyber security solutions in pursuit of better protections. As a result, they are frequently left with a patchwork security architecture that results in a high TCO. By adopting a consolidated security approach with Check Point Infinity architecture, businesses realize preemptive protection against advanced fifth-generation attacks, while achieving a 50% increase in operational efficiency and 20% reduction in security costs. The first consolidated security architecture across networks, cloud, mobile and IoT, providing the highest level of threat prevention against both known and unknown cyber-threats. 64 different threat prevention engines blocking against known and unknown threats, powered by threat intelligence. Infinity-Vision is the unified management platform for Check Point Infinity, the first modern, consolidated cyber security architecture built to prevent today’s most sophisticated attacks across networks, cloud, endpoints, etc.
  • 26
    Check Point IPS

    Check Point IPS

    Check Point IPS

    Intrusion Prevention Systems detect or prevent attempts to exploit weaknesses in vulnerable systems or applications, protecting you in the race to exploit the latest breaking threat. Check Point IPS protections in our Next Generation Firewall are updated automatically. Whether the vulnerability was released years ago, or a few minutes ago, your organization is protected. Check Point IPS delivers thousands of signature and behavioral preemptive protections. Our acceleration technologies let you safely enable IPS. A low false positive rate saves your staff valuable time. Enable IPS on any Check Point security gateway reducing total cost of ownership. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely.
  • 27
    Automai Robotic Process Automation
    Automai provides Robotic Process Automation (RPA) to automate and manage even the most complicated front and back office tasks on any application(s). No scripting. Record your scenario, then edit or build on it with simple commands in the clear interface provided. Automai has the only RPA product that shares a platform with testing and monitoring components allowing scenarios to be built once and utilized in a variety of functions in the same enterprise. With Automai Robotic Process Automation (RPA), you CAN automate those repetitive tasks and processes. We’ve been using and improving our robotic automation technology for a long time, since it we started emulating human behavior for our automated testing solutions in 2000. And it’s the best out there. Our robotic automation intelligently copes with changing variables that human’s process in decision-making every day, learning what’s important to your business, and adapting so you can focus on bigger issues.
  • 28
    SAP Internet of Things
    Leverage IoT-enriched business insights to embed in and extend business processes for transformative outcomes. The SAP Internet of Things solution offers capabilities to address industrial IoT use cases. As the IoT layer of SAP’s Business Technology Platform, it enables users to reimagine business processes and models with embedded IoT services and data. The SAP Internet of Things (SAP IoT) solution has a reference architecture that offers business services and specific capabilities to address critical industrial IoT use cases across manufacturing, supply chain, logistics, assets, products, service management, and more. Cloud service for building IoT applications and integration to business applications. Big Data that's built-in and managed. IoT data enriched with business context, rules, and event-driven integration framework. Analytical services with live integration to SAP Analytics Cloud.
  • 29
    SAP Data Services
    Maximize the value of all your organization’s structured and unstructured data with exceptional functionalities for data integration, quality, and cleansing. SAP Data Services software improves the quality of data across the enterprise. As part of the information management layer of SAP’s Business Technology Platform, it delivers trusted,relevant, and timely information to drive better business outcomes. Transform your data into a trusted, ever-ready resource for business insight and use it to streamline processes and maximize efficiency. Gain contextual insight and unlock the true value of your data by creating a complete view of your information with access to data of any size and from any source. Improve decision-making and operational efficiency by standardizing and matching data to reduce duplicates, identify relationships, and correct quality issues proactively. Unify critical data on premise, in the cloud, or within Big Data by using intuitive tools.
  • 30
    PowerTerm InterConnect
    The PowerTerm InterConnect Series is comprised of several robust terminal emulation applications supporting the host access needs of large and small organizations. It allows enterprises to standardize on a single host access solution. PowerTerm InterConnect products provides fast and reliable access to data residing on the broadest range of hosts, such as IBM Mainframe zSeries, IBM AS/400 iSeries, UNIX, OpenVMS, Tandem, HP. Each of the PowerTerm InterConnect products enables terminal emulation via various communication modes. PowerTerm InterConnect offers a flexible and extensive feature set to maximize users' time while providing a wide range of options. Using Power Script Language, users can automate tasks and increase efficiency. PowerTerm InterConnect's small footprint makes it a simple, fast and effective means of running legacy applications and it is easily installable on any PC.
  • 31
    PowerTerm Pro
    The PowerTerm Pro Series is Ericom Software's premier terminal emulation solution for Windows that simplifies and extends legacy access functionality. Supporting a diverse range of hosts and emulation types, PowerTerm Pro enables corporations to standardize on a single host access solution. Featuring a customizable GUI, SSL, SSH and secure file transfer (SFTP), PowerTerm Pro and PowerTerm Pro Enterprise offer a number of options, so corporations can choose the PowerTerm Pro product that meets their host, security, server and productivity needs. Easy-to-use intuitive GUI (graphic user interface) enables users to do their work quickly and efficiently, with drag-and-drop tools for quick data accessibility and AS/400 DFT for easy file transfer between PC and AS/400 host. PowerTerm Pro terminal emulation software is installed on a central server and accessed via a Windows desktop with per-user licensing.
  • 32
    SOLIDserver DDI

    SOLIDserver DDI

    efficient IP

    The SOLIDserver™ DDI suite is designed to deliver highly scalable, secure and robust virtual and hardware appliances for critical DNS-DHCP-IPAM services. It provides vital benefits for the agility, reliability, and security of your network infrastructure. SOLIDserver is the cornerstone of DNS, DHCP and IP Address Management (DDI) projects for datacenter automation, internet DNS, LAN infrastructures, cloud computing, digital transformation and any IT organization dealing with the challenges of a dynamic and secure infrastructure. DDI helps software defined networking (SDN) become fully integrated to the whole IT ecosystem, from orchestration of application deployment to IT Service Management (ITSM) process control. EfficientIP DDI appliances strengthen your core network foundations to support your business imperatives to improve business continuity and decrease operating costs with smart automation.
  • 33
    Storware

    Storware

    Storware

    Unparalleled data resiliency for virtual machines, containers, cloud environments, storage providers, endpoints, and Microsoft 365. One system, one universal license, many uses. Choose efficiency, transparency, cost savings. Choose true freedom of choice with our one universal license. Get rid of vendor lock-in with a stable, agentless suite of backup and snapshot management solutions for multiple open source and commercial hypervisors. Improve and automate backup performance for modern workloads. Save your resources, time, and money using an agentless, crash-consistent backup of deployments running in Kubernetes environments and stored on persistent volumes. Get the assurance of data recoverability in the event of a disaster: ransomware attack, device damage, data deletion. Maintain your business data with innovative backup solutions for Windows-based desktops and laptops. Complete backup and recovery solution for OneDrive for Business, SharePoint Online, Exchange Online, etc.
  • 34
    NetBeez

    NetBeez

    NetBeez

    Legacy network monitoring tools simply report the device status, and can’t detect end-user performance issues. NetBeez monitors the network from the end-user perspective, end-to-end, maximizing performance and availability. On the NetBeez dashboard review real-time and historical network performance information from remote locations, users, and public clouds. Rely on distributed and active network monitoring agents to cut down troubleshooting time. NetBeez appliances and software endpoints monitor the end-user experience on WAN/SD-WAN, Wi-Fi, public clouds, and home environments. NetBeez provides network engineers with data and intelligence to successfully manage the most complex network infrastructures. Dedicated hardware and software monitoring agents test on-prem and remote networks from the user perspective, measuring and reporting KPIs of service quality. Windows and Mac OS endpoints for WFH users.
  • 35
    Netwrix Password Reset
    Active Directory self-service password reset software that slashes help desk costs and user frustration. Are password-related tickets swamping your IT service desk? Do lockouts and password management headaches keep your teams from getting their work done? Netwrix Password Reset is an Active Directory password reset tool that enables users to securely reset or change their own passwords and unlock their accounts from any web browser, desktop, or mobile device, without calling the help desk. Allow users to securely set a new password, reset a forgotten AD password, and even unlock their AD account after multiple failed logon attempts, driving user productivity while slashing help desk costs. Enable users to conveniently change their passwords and unlock their accounts anywhere, anytime, from their mobile phone, tablet, or computer, or right from the Windows Logon or Unlock Computer screen.
  • 36
    Login VSI

    Login VSI

    Login VSI

    Login VSI helps organizations proactively manage the performance, cost, and capacity of their virtual desktops and applications wherever they reside - traditional, hybrid, or in the cloud. Our Login Enterprise platform is 100% agentless and can be used in all major VDI and DaaS environments, including Citrix Virtual Apps and Desktops, VMware Horizon, and Microsoft Azure Virtual Desktop (AVD). With 360° proactive visibility, IT teams can plan and maintain successful digital workplaces with less cost, fewer disruptions, and less risk. Founded in 2012, Login VSI is headquartered in] Boston, Massachusetts, and Amsterdam, Netherlands. Visit loginvsi.com and follow @loginvsi.
  • 37
    HyTrust

    HyTrust

    HyTrust

    In a multi-cloud world where technology moves at lightning speed and security often plays catchup, organizations face the daunting challenge of eliminating the gaps and resolving the inconsistencies in policy enforcement and adherence to compliance mandates. HyTrust CloudControl provides advanced privileged user access control, policy enforcement, forensic and automated compliance for private clouds. HyTrust DataControl provides powerful data-at-rest encryption and integrated key management for workloads running in any cloud environment. Encrypting workloads helps enterprises to ensure their data is protected. One of the challenges of workload encryption is scaling the management of encryption keys. HyTrust’s mission is to make private, public and hybrid cloud infrastructure more trustworthy for enterprises, service providers and government agencies. HyTrust provides solutions that automate security controls for software-defined computing, networking and storage workloads.
  • 38
    Converged Cloud Fabric
    Converged Cloud Fabric (CCF)™ is an automated fabric built with cloud networking design principles. CCF leverages VPC/VNet constructs on-prem to deliver a cloud Network-as-a-Service operational model. CCF automates networking for multiple private cloud platforms, enabling the network to operate at the speed of VMs and Containers. With built-in analytics and telemetry, CCF provides real-time contextual visibility across the fabric and one-click troubleshooting workflows. With CCF, NetOps, DevOps and CloudOps teams can effectively collaborate, and rapidly on-board applications and tenants. CCF enables mainstream and midsize organizations to leverage network as a strategic pillar of the digital transformation strategy. With CCF's self-service networking and contextual intelligence, NetOps team can focus on innovations such as new services and analytics, instead of time-consuming manual tasks.
  • 39
    Sangfor Endpoint Secure
    Identify the nature of the threat and handle it quickly and flexibly. Sangfor Endpoint Secure is a different approach to defending systems from malware and APT threats compared to current next-generation Anti-virus (NGAF) or endpoint detection & response (EDR) solutions. Endpoint Secure is part of a truly integrated cooperative security solution with Sangfor’s NGAF, IAM, and Cyber Command providing a holistic response to malware infections and APT breaches across the entire organization’s network, with ease of management, operation, and maintenance. The solution is scalable to meet the needs of any organization needing on-premise management, cloud management, or a hybrid solution. Endpoint secure is directly integrated with the Sangfor NGAF. Better real-time response to malware breaches. Quick identification and mitigation of both malicious east-west (lateral propagation) and north-south (command & control) communications. Comprehensive asset identification.
  • 40
    Lenovo ThinkAgile HX Series
    Designed for easy deployment and manageability, Lenovo ThinkAgile HX combines Nutanix software with Lenovo's #1 reliable, high performing platforms. The ThinkAgile HX1021 certified node is a purpose-built Edge solution with right-sized compute and storage on a 1U height, half-width, and short-depth form factor meeting customer needs at remote locations. The condensed design of the solution allows new compute possibilities directly where data is being generated such as a retail, manufacturing units, gas stations, restaurants, healthcare, and education. Now enhanced with new second-generation Intel processors for even faster performance, the ThinkAgile HX portfolio is optimized for a broad set of virtualized workloads, including Remote Office Branch Office; file, print, and email applications; analytics; and in-memory databases. Lenovo platforms hold the highest number of performance world records and have ranked #1 in reliability for six consecutive years.
  • 41
    Dell EMC XC Family
    XC Family solutions consist of XC Series appliances, XC Core nodes, integrated Nutanix software, and Dell EMC PowerEdge servers with Intel Xeon processors to offer one of the industry’s most versatile and scalable HCI platforms. With factory-installed Nutanix software and a choice of hypervisors, XC Family systems can be deployed quickly for all virtualized workloads to reduce management complexity and total cost of ownership. Dell EMC has over 12 years of experience integrating hardware and software for appliances built with PowerEdge servers, including 3 generations of XC Family appliances and systems. That experience enables us to develop technologies that simplify and streamline common workflows performed throughout the product’s lifecycle. Factory installation of the software stack and hypervisor. Software modules that deliver fast and seamless deployment. Tools developed specifically for HCI to simplify workflow orchestration across a cluster.
  • 42
    Netvisor ONE

    Netvisor ONE

    Pluribus Networks

    Moving to Open Networking bare metal switches brings significant operational and financial benefits to build next-generation networks. These switches provide the capacity needed to achieve cloud-scale, agility, elasticity, and adaptability. As you move to a disaggregated open networking strategy, selecting the right Network Operating System (OS) is a critical success factor. Why? The Network OS deployed unlocks the performance, functionality, and services from Open Networking switches to realize the most value. Netvisor® ONE is an open, secure, and programable next-generation Network OS that is purpose-built to optimize the power and performance of bare metal Open Networking hardware. Deployment-proven in production mission-critical enterprise and carrier networks, Netvisor ONE operating system meets the most stringent performance requirements and delivers the maximum levels of reliability and flexibility at scale, and without compromise.
  • 43
    Stromasys

    Stromasys

    Stromasys

    If your business is running legacy systems, let us help you virtualize. Our team of experts provide solutions that allow you to maintain your legacy servers without the risks associated. with aging hardware. Contact. us using the form below to speak with a specialist about implementing our Charon. solutions.
  • 44
    BlueCat Unified DDI
    Your business needs a network that can support strategic initiatives like multicloud management, SASE, SD-WAN, remote work, and beyond. That means you need core services optimized for collaboration between every team that touches the network—across NetOps, security, cloud, application development, and others. We provide DDI solutions that help your teams manage, secure, and build on your network faster and more effectively together.
  • 45
    DobiMigrate

    DobiMigrate

    DobiMigrate

    DobiMigrate® is trusted to deliver in the most complex and demanding environments and proven to meet any company's ROI and data integrity objectives for migration to new storage or the cloud. Set up quickly and manage easily with an intuitive interface. Rely on years of experience and thousands of projects completed. Be assured by verifiable proof of 100% accurate data migration. Migrate as little or as much as needed on a flexible license model. Supports all major storage platforms and thousands of configurations eliminating any vendor lock-in. Achieve the promised ROI of the new storage or cloud with minimal disruption. Datadobi, the global leader in unstructured data management software, enables enterprises to realize the value of their expanding universe of data. Datadobi helps customers to migrate and protect data while discovering insights and putting them to work for their business.
  • 46
    FaPipe IPVPN
    FatPipe IPVPN balances load and provides reliability among multiple managed and CPE-based VPNs as well as dedicated private networks. FatPipe IPVPN can also provide you with an easy low-cost migration path from the private line, frame, or point-to-point networks. You can aggregate multiple private, MPLS, and public networks without additional equipment at the provider's site. FatPipe IPVPN gives you the option of using a CPE-based VPN or a managed VPN service as a backup to your frame relay or private line. IPVPN also works with multiple managed VPN service providers when you want to backup a managed service with another managed service as part of your business continuity/disaster recovery plan. FatPipe IPVPN is the only product of its kind that works with multiple managed VPN services from multiple providers, CPE-based VPNs, and private lines to achieve the highest level of reliability, redundancy, speed, and security for interoffice data transmissions.
  • 47
    Commvault Backup & Recovery
    Ensure data availability for all workloads across cloud and on-prem environments. Wherever your data resides, ensure availability via a single interface with Commvault® Backup & Recovery. Say goodbye to costly data loss scenarios, segregated data silos, missing recovery SLAs, and inefficient scaling. Empower your team to do more. Comprehensive workload coverage (files, apps, databases, virtual, containers, cloud) from a single extensible platform and user interface. Rapid, granular recovery of data and applications, including instant recovery of virtual machines. Easily back up, recover, and move data and workloads to/from/within/between clouds. High-performance backups via storage integrations. Built-in ransomware protection including anomaly detection and reporting. Reduce costs with minimal infrastructure requirements in the cloud or on-premises. Optimize cloud vs on-premises location of data and workloads via policy-driven automation.
  • Previous
  • You're on page 1
  • Next