Loading...
Browse 28 virtualization tools
Managed cloud infrastructure, security, and operations services provider
Managed cloud infrastructure, security, and operations services provider
Managed backup and disaster recovery service with cloud and local storage
Managed backup and disaster recovery service with cloud and local storage
Virtual NGFW for public/private cloud with RTDMI threat detection
Virtual NGFW for public/private cloud with RTDMI threat detection
Hypervisor ransomware protection with real-time detection and remediation
Hypervisor ransomware protection with real-time detection and remediation
GPU workload isolation platform enabling secure multi-tenancy & virtualization
GPU workload isolation platform enabling secure multi-tenancy & virtualization
Runtime container security platform providing workload isolation via microVMs
Runtime container security platform providing workload isolation via microVMs
Application delivery controller with load balancing, WAF, and traffic mgmt.
Application delivery controller with load balancing, WAF, and traffic mgmt.
Vulnerability scanning appliance for IT infrastructure attack surface reduction
Vulnerability scanning appliance for IT infrastructure attack surface reduction
Virtual private server hosting solution for MDaemon email server
Virtual private server hosting solution for MDaemon email server
Virtual cloud servers with elastic scaling and compute resources
Virtual cloud servers with elastic scaling and compute resources
Virtual ICT lab management platform for educational institutions and L&D orgs
Virtual ICT lab management platform for educational institutions and L&D orgs
Energy-efficient thin client devices for centralized VDI computing
Energy-efficient thin client devices for centralized VDI computing
Network hyperconverged infrastructure for virtualizing network functions
Network hyperconverged infrastructure for virtualizing network functions
Endpoint DLP solution for discovering, protecting, and monitoring sensitive data
Endpoint DLP solution for discovering, protecting, and monitoring sensitive data
Software firewalls for multicloud workload protection with Layer 7 threat prevention
Software firewalls for multicloud workload protection with Layer 7 threat prevention
Real-time virtualization tech that contains unknown executables in containers
Real-time virtualization tech that contains unknown executables in containers
Endpoint protection for workstations with layered defense against malware
Endpoint protection for workstations with layered defense against malware
Zero-trust kernel virtualization platform for endpoint defense and threat containment
Zero-trust kernel virtualization platform for endpoint defense and threat containment
A configurable data destruction toolkit that securely erases sensitive virtual data, temporary files, and swap memory using customizable overwrite methods.
A configurable data destruction toolkit that securely erases sensitive virtual data, temporary files, and swap memory using customizable overwrite methods.
NBD (Network Block Device) is a network protocol implementation that allows clients to access remote block devices over a network as if they were local storage.
NBD (Network Block Device) is a network protocol implementation that allows clients to access remote block devices over a network as if they were local storage.
Hyper-converged infrastructure solution for virtualization and cloud computing
Hyper-converged infrastructure solution for virtualization and cloud computing
Endpoint protection platform using zero trust architecture and containment
Endpoint protection platform using zero trust architecture and containment
Haaukins is an automated virtualization platform that provides hands-on cybersecurity education through capture the flag exercises in controlled vulnerable environments.
Haaukins is an automated virtualization platform that provides hands-on cybersecurity education through capture the flag exercises in controlled vulnerable environments.
A userland implementation of the Network Block Device protocol that enables remote block device access over network connections for distributed storage and virtualization use cases.
A userland implementation of the Network Block Device protocol that enables remote block device access over network connections for distributed storage and virtualization use cases.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance