4 Integrations with VNC Connect

View a list of VNC Connect integrations and software that integrates with VNC Connect below. Compare the best VNC Connect integrations as well as features, ratings, user reviews, and pricing of software that integrates with VNC Connect. Here are the current VNC Connect integrations in 2024:

  • 1
    Kasm Workspaces

    Kasm Workspaces

    Kasm Technologies

    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm uses our high-performance streaming and secure isolation technology to provide web-native Desktop as a Service (DaaS), application streaming, and secure/private web browsing. Kasm is not just a service; it is a highly configurable platform with a robust developer API and devops-enabled workflows that can be customized for your use-case, at any scale. Workspaces can be deployed in the cloud (Public or Private), on-premise (Including Air-Gapped Networks or your Homelab), or in a hybrid configuration.
    Leader badge
    Starting Price: $0 Free Community Edition
    View Software
    Visit Website
  • 2
    Activeeon ProActive
    The solution provided by Activeeon is suited to fit modern challenges such as the growth of data, new infrastructures, cloud strategy evolving, new application architecture, etc. It provides orchestration and scheduling to automate and build a solid base for future growth. ProActive Workflows & Scheduling is a java-based cross-platform workflow scheduler and resource manager that is able to run workflow tasks in multiple languages and multiple environments (Windows, Linux, Mac, Unix, etc). ProActive Resource Manager makes compute resources available for task execution. It handles on-premises and cloud compute resources in an elastic, on-demand and distributed fashion. ProActive AI Orchestration from Activeeon empowers data engineers and data scientists with a simple, portable and scalable solution for machine learning pipelines. It provides pre-built and customizable tasks that enable automation within the machine learning lifecycle, which helps data scientists and IT Operations work.
    Starting Price: $10,000
  • 3
    Incident IQ

    Incident IQ

    Incident IQ

    Incident IQ is committed to supporting teaching and learning by transforming technology support, asset management and services delivery to meet the needs of today’s K-12 schools. Incident IQ is transforming K-12 workflows by digitizing service delivery to empower students, teachers, and support teams. From help desk ticketing and IT asset management to maintenance work orders and beyond, Incident IQ is revolutionizing the way school districts provide and manage services. Get learning devices into students' hands quickly. Easily check devices in and out. Track previous ownership, storage location, and more. Enterprise-level asset management tools, built for the scale of today’s K-12 technology. Asset management software is a centralized system that allows your organization to track important asset information in real-time. This decreases administrative costs, streamlines service management processes, and gives your organization greater visibility into asset usage and maintenance.
  • 4
    ThreatAware

    ThreatAware

    ThreatAware

    Leveraging API feeds from your existing tools, validate your controls are correctly deployed and functioning across every cyber asset. Our clients come from all industries, from legal to finance, charities to retail. We are trusted by leading organizations to discover and protect their valuable cyber assets. Create a highly accurate device inventory by connecting to your existing systems via API. When issues arise the workflow automation engine can trigger actions via a webhook. ThreatAware provides clarity of the security control health of your cyber assets in a clear and simple design. Gain a macro view of your security control health regardless of how many controls you are monitoring. Generated from any field from a device, allows you to quickly group your cyber assets for monitoring and configuration purposes. When your monitoring systems accurately depicts your live environment, every alert is real.
  • Previous
  • You're on page 1
  • Next