[go: up one dir, main page]

Results for: vm - Page 3

Suggested Categories:

Virtual Machine (VM) Backup Software
Virtual machine (VM) backup software provides users with a way to securely and reliably protect their virtual environment.
Virtual Machine Software
Virtual machine software allows users to run multiple operating systems on a single physical computer by creating isolated, virtualized environments. Each virtual machine (VM) operates as a fully functional computer with its own CPU, memory, storage, and network resources, independent of the host system. This technology is widely used for software testing, development, running legacy applications, and server consolidation. Many VM solutions support snapshots, cloning, and resource management to optimize performance and recovery. By enabling flexibility, scalability, and cost savings, virtual machine software is a cornerstone of modern IT infrastructure and cloud computing.
Virtualization Software
Virtualization software enables the creation and management of virtual machines (VMs) that emulate physical computers. By abstracting the underlying hardware, it allows multiple operating systems to run on a single physical machine, improving resource utilization and flexibility. Virtualization provides an isolated environment for applications, increasing security and stability by preventing conflicts between different software systems. It also simplifies the management of IT infrastructure, as virtual machines can be easily created, cloned, and moved between different hosts. This technology is crucial for businesses looking to scale their operations, optimize resource usage, and improve disaster recovery processes.
Vendor Management Software
Vendor management software is software used by businesses to effectively manage their relationships with suppliers and vendors. It provides a central platform for tracking vendor information, contracts, and performance metrics. With this software, companies can streamline their purchasing processes, monitor vendor compliance and ensure timely payments. Some key features include automated inventory management, budgeting capabilities, and reporting functionalities. It is commonly utilized in industries such as manufacturing, retail, and healthcare to improve efficiency and reduce costs associated with vendor management.
Firewall Software
Firewall software is a security tool that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Acting as a barrier between a trusted internal network and untrusted external networks, firewalls help prevent unauthorized access and protect against cyber threats. They work by analyzing data packets and determining whether they should be allowed through based on set policies, blocking potentially harmful traffic. Modern firewalls often incorporate advanced features like intrusion prevention, application filtering, and deep packet inspection to strengthen security further. By providing this critical layer of protection, firewall software safeguards sensitive data and ensures the integrity of networked systems.
Server Virtualization Software
Server virtualization software is a form of technology that allows multiple virtualized operating systems to be hosted on the same physical server. This software helps businesses increase their resource utilization and reduce their operational costs by consolidating their IT infrastructure. It also enables them to better manage their server resources and workloads, as well as quickly deploy new servers in support of specific applications. Additionally, this type of software simplifies the process of maintaining and troubleshooting hardware-related issues.
  • 1
    NFVgrid

    NFVgrid

    InterCloud Systems

    ...NFVgrid provides performance monitoring functions as well as a meaningful representation of the different kinds of analytical data for the traffic passing through the network or a particular VM.
  • 2
    Select Business Solutions NOMAD

    Select Business Solutions NOMAD

    Select Business Solutions

    ...NOMAD is a fully relational product, which provides the basis for its tight integration with and highly efficient use of other relational database engines such as DB2 for z/OS and DB2 for z/VM. The NOMAD database, which is both relational and hierarchical, has been used by our customers for years to provide an efficient repository of their data. Even though relational is the more common approach for a database today, a hierarchical approach may be more efficient for data storage and for reporting access based on the organization of your data. ...
    Starting Price: $2500.00/one-time/user
  • 3
    Honeywell MAXPRO
    The Honeywell MAXPRO VMS/NVR solutions conduct real-time monitoring of people within a building to determine compliance to a building’s customized guidelines on wearing mask and social distancing adherence with deep learning AI capabilities. The advanced analytics provide a very high accuracy, when used in the recommended operating conditions, and can isolate and report any instances of non-compliance to buildings and facilities managers.
  • 4
    CYRES

    CYRES

    CYRES

    ...Your private cloud to respond with agility to the rapid evolution of your business. The cloud benchmark on which millions of companies are already relying to gain agility. A wide range of cloud solutions to create VMs in seconds.
  • 5
    SQUAD1

    SQUAD1

    Talakunchi Networks

    SQUAD1 VM is a Risk-Based Vulnerability Management and Orchestration Platform. Aggregates the Vulnerability data from various technology solutions, vulnerability scanners, and manual penetration testing assessments. Squad1 performs cyber risk quantification for all the vulnerability feed and these vulnerability insights with supporting risk scoring make the security team's life easier for quick actions.
  • 6
    NSFOCUS RSAS
    ...NSFOCUS RSAS provides comprehensive vulnerability detection, expert security analysis, and actionable remediation guidance to safeguard your critical data assets and meet compliance requirements. NSFOCUS RSAS is available in both hardware and VM subscription formats, ensuring flexible deployment options for your needs. NSFOCUS RSAS has consistently demonstrated its position as a market leader. This recognition is a testament to NSFOCUS RSAS’s unwavering commitment to innovation and effectiveness, establishing it as the trusted choice for organizations seeking comprehensive vulnerability detection and remediation. ...
  • 7
    Daytona

    Daytona

    Daytona

    Daytona is a cloud-native development runtime that enables developers and AI agents to instantly create, run, and manage isolated sandboxes for any codebase. Each sandbox runs inside a secure microVM with full Linux compatibility, networking, and persistent storage. Daytona provides SDKs in Python and TypeScript, allowing applications to programmatically execute code, run processes, upload files, or spin up environments dynamically. Teams use Daytona to replace complex local setups with reproducible cloud sandboxes that can be started in seconds and accessed through preview URLs, SSH, or APIs. ...
  • 8
    NVIDIA virtual GPU
    ...Deliver performance virtually indistinguishable from a bare metal environment. Leverage common data center management tools such as live migration. Provision GPU resources with fractional or multi-GPU virtual machine (VM) instances. Responsive to changing business requirements and remote teams.
  • 9
    Averroes

    Averroes

    Averroes.ai

    Averroes.ai is a no-code, AI-powered platform designed for manufacturing and industrial applications, specializing in visual inspection, advanced process control (APC), and virtual metrology (VM). It achieves over 99% accuracy in defect detection and integrates seamlessly with existing systems across industries such as semiconductors, electronics, solar energy, and more. The platform leverages AI to automate defect detection, enable real-time process optimization, and reduce false positives, enhancing quality control, productivity, and operational efficiency with flexible deployment options.
  • 10
    OpenText Server Backup
    ...The platform delivers VMware and Hyper-V protection with RTOs as low as two minutes, Microsoft application data recovery to fully functional states, and granular restores to files, folders, or VMs.
  • 11
    OS-Easy

    OS-Easy

    OS-Easy

    Committed to the research and development of cutting-edge technologies such as cloud computing, desktop virtualization, smart desktop, edge computing for users in education, government, enterprise, medical, energy and other industries. Virtual desktop infrastructure (VDI) is the practice of hosting a desktop operating system within a virtual machine (VM) running on a centralized server. Virtual Desktops (VDI) will speed up the desktop processing by moving the software off of the desktops and onto a central server in the data center. With this model, one software image is created which contains all software titles for the labs and classrooms. This image can be accessed by any computer in any lab or classroom. ...
    Starting Price: $19 one-time payment
  • 12
    TrueSight Automation for Servers
    ...Configuration: Harden deployments at time of provisioning and in production, detect and remediate drift, and manage change activities to ensure stability and performance. Service provisioning: Automated build-out of service or application from VM provisioning to fully operational.
  • 13
    Erecruit

    Erecruit

    Bullhorn

    ...Erecruit offers the most innovative, cutting-edge and complete enterprise staffing software, designed by staffing experts, for staffing experts. Our highly integrated suite of front-office, middle-office, vendor management system (VMS) and onboarding modules makes it the most comprehensive, all-inclusive platform for all major verticals within the staffing industry. Erecruit is designed to meet the needs of large, multi-region, multi-division staffing firms that operate numerous lines of business and want to incorporate best practices into their business operations. ...
  • 14
    CONNX

    CONNX

    Software AG

    ...Connect and transform legacy data sources from transactional databases to big data or data warehouses such as Hadoop®, AWS and Azure®. Or move legacy to the cloud for scalability, such as MySQL to Microsoft® Azure® SQL Database, SQL Server® to Amazon REDSHIFT®, or OpenVMS® Rdb to Teradata®.
  • 15
    Tigera

    Tigera

    Tigera

    Kubernetes-native security and observability. Security and observability as code for cloud-native applications. Cloud-native security as code for hosts, VMs, containers, Kubernetes components, workloads, and services to secure north-south and east-west traffic, enable enterprise security controls, and ensure continuous compliance. Kubernetes-native observability as code to collect real-time telemetry, enriched with Kubernetes context, for a live topographical view of interactions between components from hosts to services. ...
  • 16
    Commvault HyperScale X
    ...Simple, flexible data protection for all workloads including containers, virtual, and databases. Built-in resiliency ensures data availability during concurrent hardware failures. Data reuse via copy data management that provides instant recovery of VMs and live production copies for DevOps and testing. High-performance backup and recovery with automatic load balancing, enhanced RPO, and reduced RTO. Cost-optimized cloud data mobility to move data to, from, within, and between clouds. Disaster recovery testing of replicas directly from the hardware.
  • 17
    Atkku Invoice Manager
    Everything that is to Invoicing Automation, 100% Accurate Invoices, 300% cut on Time Spend, Streamlined A/R Processing, Automated Customer Invoice dispatch, Powerful VMS Add-on, Automated Contract Compliance, Daily Past-dues and Timesheets Reminders, Multi-state Tax Invoice, and more. Create perfect invoices, track payments and get paid faster with futuristic yet contemporary invoicing designed for staffing companies. Focus more on core business activities while the application intelligence takes care of invoicing, timesheets and past due reminders. ...
    Starting Price: $75 one-time payment
  • 18
    Active Backup for Business
    Active Backup Suite Active Backup centralizes backup tasks for VMware, Hyper-V, Windows endpoints, Microsoft 365 and G Suite to Synology NAS – and lets you manage from one simple console. Fast and reliable recovery delivered to keep running services, VMs, and files instantly available. Integrated backup solution. With Synology NAS and the Active Backup suite, we seamlessly complement hardware with software by providing an integrated backup and recovery appliance. This turnkey solution centralizes your data administration, and streamlines acquisition, deployment and technical support. ...
  • 19
    Covail

    Covail

    Covail

    Covail’s Vulnerability Management Solution (VMS) is designed with an easy-to-use tool where IT security teams can assess applications and network scans, understand threats on their attack surface, continuously track vulnerabilities, and manage priorities. More than 75% of enterprise systems have at least one security vulnerability. And, attackers aren’t hesitating to take advantage.
  • 20
    PowerTerm InterConnect
    ...PowerTerm InterConnect products provides fast and reliable access to data residing on the broadest range of hosts, such as IBM Mainframe zSeries, IBM AS/400 iSeries, UNIX, OpenVMS, Tandem, HP. Each of the PowerTerm InterConnect products enables terminal emulation via various communication modes. PowerTerm InterConnect offers a flexible and extensive feature set to maximize users' time while providing a wide range of options. Using Power Script Language, users can automate tasks and increase efficiency. PowerTerm InterConnect's small footprint makes it a simple, fast and effective means of running legacy applications and it is easily installable on any PC.
  • 21
    Diamond IP

    Diamond IP

    Cygna Labs

    ...We offer software, hardware and virtual appliance (private and public) products, as well as managed IPAM services. We facilitate multi-cloud IPAM with virtual appliances for AWS, Azure, Oracle VM, VMware, Hyper-V and others. And our cloud automation appliance dynamically automates the assignment and tracking of private and public cloud instance IP addresses and DNS names. Our DNS security products supplement your defense in depth security strategy at the DNS layer. We serve global multinational organizations around the world with our security, cloud and networking services.
  • 22
    Corent

    Corent

    Corent

    Augment your offerings to include high-demand capabilities like automated containerization. Amplify your team by increasing deal volume without adding staff. Effortlessly open up a new revenue stream by reducing customer cloud spend by as much as 40%. Onboard customers with no friction and start managing applications across clouds right away. Accelerate time to market for your SaaS offering by eliminating development of SaaS capabilities, including usage metering & billing, subscription...
  • 23
    Razberi

    Razberi

    Razberi

    ...We save customers' install and maintenance costs and reduce the likelihood of a costly cyber breach. Razberi products are installed alongside 3rd party IP cameras and compatible Video Management Software (VMS) products in a simple plug-and-play format, making it easier for anyone to install a video surveillance solution. All-in-one Windows appliances, server, switching, storage. Connect to 3rd party IP cameras and IoT devices. Appliances for a wide range of deployment options. Monitor™ for on-premise visibility or via the cloud. CameraDefense™ to defend IP cameras against cyber attacks. ...
  • 24
    Spinnaker ATMS
    ...Spinnaker ATMS has been designed as an integration platform for multiple sub-systems such as intersection control, travel times, adaptive traffic control, CCTV, incident detection, dynamic message signs and more. Mobile accessibility; access from anywhere. Integration platform for multiple ITS subsystems (traffic control, travel times, CCTV, VMS, adaptive, etc). Compatible with any operating system and computing device. Appropriate for all systems, small to large cities. The Navigator allows seamless scrolling and zooming of map displays from a user-friendly and responsive edge to edge mapping interface.
  • 25
    TestEngine

    TestEngine

    SmartBear

    TestEngine is an optimized test execution engine for automating SoapUI and ReadyAPI tests at a tremendous scale. With flexible deployment options, TestEngine can be installed in any cloud or on-premise environment using Docker, VMs, Mac, Linux, or Windows, supporting centralized execution models or distributed options. Accelerate your delivery pipelines by executing tests concurrently with TestEngine. Run large test suites alongside shorter ad-hoc test cases with minimal infrastructure maintenance. TestEngine queues requests to execute tests as they arrive, staging projects being submitted during peak times. ...
  • 26
    Aquaforest Searchlight
    ...For on-premises SharePoint you would install Searchlight on an on-premises server, communication is made between Searchlight and your on-prem SharePoint via standard Microsoft APIs and the document processing is performed on the server where Searchlight is installed. All our products are supported on virtual machines including Oracle VM virtual box.
    Starting Price: €416 per year
  • 27
    Cisco Prime Network Registrar
    ...The system manages server load by redistributing DHCP lease renewals for better utilization across clusters, using a variety of deployment options such as image download, Docker container, VM OVA, QCOW2, or pre-loaded appliance. To ensure reliability, it employs multiple levels of redundancy with DHCPv4 and DHCPv6 safe failover and supports high-availability DNS (HA-DNS). Custom dashboards report the status and trends of DHCP and DNS operations. The solution is extensible, featuring a powerful extensions interface and REST APIs.
  • 28
    SBC Software Edition (SBC SWe)

    SBC Software Edition (SBC SWe)

    Ribbon Communications

    ...It offers the same robust features as Ribbon's hardware-based SBC 5400 and SBC 7000 appliances, including extensive audio codec transcoding, signaling interworking, call admission control, and comprehensive security measures such as encryption and protection against Denial of Service attacks. The SBC SWe can be deployed as a Virtual Machine (VM) on industry-standard servers in data centers, as a Virtual Network Function (VNF) in private clouds using OpenStack, or in public clouds like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). This flexibility allows enterprises to scale their communications infrastructure efficiently while maintaining high performance and security standards.
  • 29
    Sensing Feeling

    Sensing Feeling

    Sensing Feeling

    ...SensorMAX, integrates with existing CCTV and control systems to provide real-time video analytics without recording or transmitting images, ensuring privacy. The Visual Processing Engine (VPE) operates at the edge, connecting to current Video Management Systems (VMS) or Network Video Recorders (NVR), processing feeds simultaneously. SensorMAX supports a range of algorithms for applications like crowd density monitoring, anomaly detection, and PPE compliance, and can interface with SCADA systems for automated alerts and responses. SensorCODE is tailored for embedding into low-power IoT edge systems, facilitating continuous remote sensing with real-time telemetry over networks like WiFi, LoRaWAN, and 4G/5G.
  • 30
    IBM PowerVC
    ...PowerVC facilitates efficient resource utilization by enabling resource pooling and implementing placement policies, thereby optimizing IT costs. The Dynamic Resource Optimizer (DRO) provides policy-based automation for active workload balancing within host groups, ensuring optimal performance. VM templates support consistency and standardization, streamlining deployments and reducing labor costs. Key features include automated I/O configuration for mobility and high availability, and seamless import and deployment of workload images.