Alternatives to Apptimized SafeBox

Compare Apptimized SafeBox alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Apptimized SafeBox in 2026. Compare features, ratings, user reviews, pricing, and more from Apptimized SafeBox competitors and alternatives in order to make an informed decision for your business.

  • 1
    Thinfinity Workspace

    Thinfinity Workspace

    Cybele Software, Inc.

    Thinfinity® Workspace 7 is a comprehensive, secure platform that offers a zero-trust approach, enabling secure and contextual access to corporate virtual desktops, virtual applications, internal web apps, SaaS, and files, whether they are on Windows, Linux, or mainframes. It supports various deployment models, including cloud, on-premise, and hybrid settings, and can be deployed on any cloud provider of your choice. With its proprietary reverse gateway technology, Thinfinity® Remote Workspace 7 ensures secure reverse connections over SSL with TLS 1.3 encryption. This robust approach doesn't require client-side installations, firewall modifications, or the opening of inbound ports on your network, thereby enhancing the security infrastructure of your business. The platform ensures all browser-based connections are secured over HTTPS, offering a wide variety of authentication options, from straightforward User/Password to sophisticated Active Directory authentication.
    Leader badge
    Compare vs. Apptimized SafeBox View Software
    Visit Website
  • 2
    Kasm Workspaces

    Kasm Workspaces

    Kasm Technologies

    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm uses our high-performance streaming and secure isolation technology to provide web-native Desktop as a Service (DaaS), application streaming, and secure/private web browsing. Kasm is not just a service; it is a highly configurable platform with a robust developer API and devops-enabled workflows that can be customized for your use-case, at any scale. Workspaces can be deployed in the cloud (Public or Private), on-premise (Including Air-Gapped Networks or your Homelab), or in a hybrid configuration.
    Leader badge
    Partner badge
    Compare vs. Apptimized SafeBox View Software
    Visit Website
  • 3
    Flexiscale

    Flexiscale

    Flexiscale

    Flexiscale provides secure and flexible IaaS and Hosted Desktop solutions. Our Hosted Desktops, enabling hybrid & remote working, retain the same Windows desktop experience with constant secure access to all your data and applications, safe in the knowledge that your files are secure and backed up. Flexiscale's hosted desktop remains constant whether you are accessing it from the office on a PC or Mac, at home on a laptop or tablet or on the move with a smartphone. Flexiscale’s IaaS Platform provides businesses with highly scalable, enterprise-grade Infrastructure as a Service (IaaS). Our service offers the ability to instantly scale up and scale down servers and resources, as required. No contract. Pay only for what you use with guaranteed up-time.
  • 4
    VMware Fusion Pro
    VMware Fusion gives Mac users the power to run Windows on Mac along with hundreds of other operating systems side by side with Mac applications, without rebooting. Fusion is simple enough for home users and powerful enough for IT professionals, developers and businesses. Running Windows on Mac is only the beginning. VMware Fusion lets you choose from hundreds of supported operating systems, from lesser-known Linux distributions to the latest Windows 10 release, to run side by side with the latest macOS release. Fusion makes it simple to test nearly any OS and app on a Mac. Build and test apps in a sandbox while securely sharing local source files and folders. Fusion Pro now includes a RESTful API to integrate with modern development tools like Docker, Vagrant, Ansible, Chef, and others to fit the power of VMware into today’s Agile and DevOps-oriented production pipelines.
  • 5
    Omnissa Horizon Cloud Service
    Modernize virtual desktop and app delivery with a next-generation hybrid desktop-as-a-service (DaaS) platform. Innovative “thin edge” architecture minimizes the infrastructure footprint, yielding lower operational costs, enhanced stability, and reduced maintenance. Boost VDI scalability with a modern, cloud-native design. Manage desktop and app virtualization, scaling capacity to meet organizational needs. Horizon Control Plane Services simplify day-to-day operations and provide visibility needed to gain insights into and troubleshoot environments. Enhance desktop virtualization with a managed DaaS platform, promoting speed, flexibility, and productivity across a distributed workforce while maintaining cost-effectiveness. Deliver virtual desktops and apps from whichever location makes the most sense, while managing all environments from a single pane of glass.
  • 6
    Shadow Defender

    Shadow Defender

    Shadow Defender

    Shadow Defender is an easy-to-use security solution (for Windows operating systems) that protects your PC/laptop real environment against malicious activities and unwanted changes. Shadow Defender can run your system in a virtual environment called 'Shadow Mode'. 'Shadow Mode' redirects each system change to a virtual environment with no change to your real environment. If you experience malicious activities and/or unwanted changes, perform a reboot to restore your system back to its original state, as if nothing happened. With Shadow Defender, you have the flexibility to specify which files and folders are permanently saved to the real environment. This ensures important files and folders are kept after a reboot. If you want to make a maintenance-free computer, Shadow Defender will be your best choice. Surf the internet safely and eliminate unwanted traces. Eliminate system downtime and maintenance costs. Reboot to restore your system back to its original state.
    Starting Price: $39 one-time payment
  • 7
    SHADE Sandbox

    SHADE Sandbox

    SHADE Sandbox

    You browse the internet everywhere and your device is at a threat of malware attack, therefore advanced appliance-based sandboxing is immensely useful. Sandboxing tool is like a protective layer that restrains viruses and malware in the virtual environment. SHADE Sandbox is used to safely execute suspicious code without any risk of causing harm to the network or host device. SHADE Sandbox is a program that creates an isolated environment. It is the most effective shareware sandboxing solution. Downloading and installing SHADE Sandbox for advanced malware attack prevention creates a layer of protection against any security threat, which is previously unseen cyber-attacks and particularly, stealthy malware. The best part of sandbox is what happens in the sandbox remains in it – prohibiting system failures and stopping software vulnerabilities from spreading. SHADE Sandbox and protect your PC!
    Starting Price: $ 21.02 per year
  • 8
    FortiSandbox
    Unlike previous generation of viruses that were non-sophisticated and low in volume, antivirus tools were sufficient to provide reasonable protection with their database of signatures. However, today’s modern malware entails new techniques such as use of exploits. Exploiting a vulnerability in a legitimate application can cause anomalous behavior and it’s this behavior that attackers take advantage of to compromise computer systems. The process of an attack by exploiting an unknown software vulnerability is what is known as a zero-day attack aka 0-day attack, and before sandboxing there was no effective means to stop it. A malware sandbox, within the computer security context, is a system that confines the actions of an application, such as opening a Word document, to an isolated environment. Within this safe environment the sandbox analyzes the dynamic behavior of an object and its various application interactions in a pseudo-user environment and uncovers any malicious intent.
  • 9
    CloudSandboxes

    CloudSandboxes

    CloudSandboxes

    Now it is possible to organize your one-day resources in the CloudSandboxes environment. Save up to 80%. To manage resources created during a demo, you need to keep track on them. Create these one-day resources in a sandbox environment. CloudSandboxes will organize the closing after each working day. Quality asks for cloud certified employees. Preparation for exams should be done in a save and cheap sandbox solution. The created resources for this purpose are neatly cleaned up by CloudSandboxes. An architect will experiment with cloud resources before they become part of a user story. Use these temporarily resources in a sandbox solution. They will not clutter dev and test environments. CloudSandboxes will safely close only your one-day resources. CloudSandboxes has no restrictions on its use. You can use CloudSandboxes to manage all your one-day resources. CloudSandboxes will take care of the used one-day resources when their working day is over.
    Starting Price: €199 per month
  • 10
    Cameyo

    Cameyo

    Cameyo

    Cameyo is the secure Virtual Application Delivery (VAD) platform for any Digital Workspace. Cameyo makes it simple, seamless, and secure to deliver Windows and internal web applications to any device from the browser without the need for virtual desktops or VPNs. By enabling organizations to provide their people with secure access to the business-critical apps they need to stay productive from anywhere, Cameyo helps make remote & hybrid work, work. Hundreds of enterprises and organizations utilize Cameyo’s Digital Workspace solution to deliver Windows and internal web applications to hundreds of thousands of users worldwide.
    Starting Price: $12.00/month/user
  • 11
    V-OS Virtual Secure Element
    V-OS is V-Key’s core patented technology, a virtual secure element. It is a secure sandbox that is embedded within a native iOS or Android mobile app and creates a safe operating environment where data can be stored and cryptographic processes can be executed in isolation from the rest of the mobile app. In this video, we take a step back to introduce and explain the core of our technology, V-OS. With V-OS as the security foundation of your mobile application, your organization can build a wide range of solutions that are secure, trusted and scalable, and customized to your business needs. Layered tamper detection and response mechanisms. Patented cryptographic virtual machine. FIPS 140-2 Level 1 and Common Criteria EAL3+. Minimizes total costs of ownership. Faster market penetration with effortless over-the-air deployment. Flexible and extensible SDK framework. Eradicate costly hardware dependency.
  • 12
    Avast Premium Security
    Spoofed (fake) websites are one of the oldest hacking tricks in the book. Avast Premium Security scans websites for security risks on both your computer and mobile phone, so you can finally shop and bank online safely on any device. Remote access attacks are on the rise — and the last thing you want is for a hacker to remotely take control of your PC and infect it with malware or lock your files with ransomware. Avast Premium Security now protects your PC against these attacks. Viruses, ransomware, scams, and other attacks target Windows more than any other operating system. So if you’re a PC owner, the stronger your protection, the better. Your Mac is not immune to malware. And malware isn’t even the only threat Macs face. Malicious websites and vulnerable Wi-Fi networks can also jeopardize your safety — unless you have the right protection. Android phones are vulnerable to both malware and theft.
    Starting Price: $39.99 per device per year
  • 13
    Deep Freeze

    Deep Freeze

    Faronics

    Faronics Deep Freeze makes PCs indestructible. It protects endpoints by Freezing a snapshot of a computer’s desired configuration and settings defined by the IT Admin. With an instant reboot, any unwelcome or unwanted changes are removed from the system, restoring it to its pristine Frozen state. Freeze your endpoints to the desired state. Restore from any unexpected changes with a simple reboot. Provide users with unrestricted access and avoid restrictive computer lockdown for maintaining security. Reverse configuration drifts with a simple reboot while allowing users to save their work. Reverse malicious changes on reboot and protect computers from phishing scams. Only approved software stays and unauthorized software is removed thereby achieving license compliance. Effectively reverse malicious changes to your computers including zero-day threats.
  • 14
    Symantec Content Analysis
    Symantec Content Analysis automatically escalates and brokers potential zero-day threats for dynamic sandboxing and validation before sending content to users. Analyze unknown content from one central location. Leveraging Symantec ProxySG, this malware analyzer uses a unique multi-layer inspection and dual-sandboxing approach to reveal malicious behavior and expose zero-day threats, and safely detonate suspicious files and URLs. Content Analysis delivers multi-layer file inspection to better protect your organization against known and unknown threats. Unknown or suspicious content from sources like ProxySG, messaging gateway, or other tools is delivered to Content Analysis for deep inspection, interrogation, analysis and ultimately blocking, if deemed malicious. Recent enhancements to Content Analysis strengthens this platform even further.
  • 15
    Apozy Airlock
    Apozy Airlock. The browser endpoint detection and response platform that neutralizes web attacks in one click. The Internet is a dangerous place. It doesn’t have to be. Airlock fills the gap in your EPP/EDR by protecting the browser, delivering a safe, clean, and lightning-fast internet experience. Powered by the very first visually-aware native browser isolation platform with over 6 petabytes of visual data, Airlock prevents web attacks in real time. Airlock stops spearfishing in its tracks. With a visual model database of over 67.83 billion pages which analyzes over 12.20 trillion links per year, our technology protects anyone clicking on a malicious link by sandboxing the threat.
    Starting Price: $9/month/user
  • 16
    Sandboxie

    Sandboxie

    Sandboxie

    Sandboxie is a sandbox-based isolation software for 32- and 64-bit Windows NT-based operating systems. It is being developed by David Xanatos since it became open source, before that it was developed by Sophos (which acquired it from Invincea, which acquired it earlier from the original author Ronen Tzur). It creates a sandbox-like isolated operating environment in which applications can be run or installed without permanently modifying the local or mapped drive. An isolated virtual environment allows controlled testing of untrusted programs and web surfing. Since the Open Sourcing sandboxie is being released in two flavors the classical build with a MFC based UI and as plus build that incorporates new features and an entirely new Q’t based UI. All newly added features target the plus branch but often can be utilized in the classical edition by manually editing the sandboxie.ini file.
  • 17
    CodeSandbox

    CodeSandbox

    CodeSandbox

    CodeSandbox is a cloud development platform that empowers development teams to code, collaborate, and ship projects of any size from any device in record time. Run your code in powerful microVMs and build anything without limits. We configure your environment for you and keep your code always ready, behind a URL. Boxy, the CodeSandbox AI coding assistant, is also now available to all Pro subscribers.
    Starting Price: $12 per month
  • 18
    Avira Cloud Sandbox
    The Avira Cloud Sandbox is an award-winning, unlimited-scale automated malware analysis service. It blends multiple advanced analysis technologies to deliver a complete threat intelligence report from an uploaded file. The Cloud Sandbox API delivers a detailed, file-specific, threat intelligence report. It contains valuable, actionable intelligence. The report has a detailed classification of the file, information on the techniques, tactics and procedures (IoCs) present in the threat, and a description of how and why the submitted file was identified as clean, malicious, or suspicious. Avira’s Cloud Sandbox leverages the technologies developed within the Avira Protection Cloud, the cloud security system that underpins the anti-malware and threat intelligence solutions of Avira. Through OEM technology partnerships we protect many of the world’s leading cyber-security vendors, and nearly a billion people world-wide.
  • 19
    ANY.RUN

    ANY.RUN

    ANY.RUN

    ANY.RUN is an online interactive sandbox for DFIR/SOC investigations. The service gives access to fast malware analysis and detection of cybersecurity threats. The effectiveness of the solution has been proven by over 500,000 active users who find new threats with ANY.RUN daily. ANY.RUN provides an interactive sandbox for malware analysis, offering deep visibility into threat behavior in a secure, cloud-based environment with Windows, Linux, and Android support. It helps SOC teams accelerate monitoring, triage, DFIR, and threat hunting — enabling them to analyze more threats in a team and process more alerts in less time. Learn more at ANY.RUN's website.
  • 20
    WP Sandbox

    WP Sandbox

    WP Sandbox

    Let your customers try your WordPress solutions in a customized sandbox before they buy. Front-end and back-end, fully customizable. Perfect for WordPress developers, designers, & agencies who want to let clients explore fully-functioning backend demos of their work. We’re loved by customer support teams who need to quickly diagnose issues and share their findings with the rest of the team with a simple reusable link. Give your customers access to full WordPress sandbox demo sites — pre-installed with your plugins and themes, and customized with your settings. Create full WordPress sites, complete with front-end and secure back-end access with one easy link.
    Starting Price: $49 per month
  • 21
    Comodo Internet Security
    Our sandbox technology automatically locks unknown files in a secure environment while our Valkyrie system tests their behavior in real-time - protecting you against malware that the virus industry hasn’t even discovered yet. Hot spot protection that encrypts all data transmitted over both wired and wireless Internet connections up to 10GB per month. Secure Shopping lets you shop and bank online with confidence. This breakthrough technology isolates your browser inside a secure container which cannot be hacked, tracked or viewed by malware or internet thieves. Tracks down and destroy any existing malware hiding in a PC. Detects spyware threats and destroys each infection. Prevents malicious software turning your PC into a zombie. Protects critical system files and blocks malware before it installs. Cutting-edge protection against sophisticated buffer overflow attacks.
    Starting Price: $29.99 per year
  • 22
    Cuckoo Sandbox
    You can throw any suspicious file at it and in a matter of minutes Cuckoo will provide a detailed report outlining the behavior of the file when executed inside a realistic but isolated environment. Malware is the swiss-army knife of cybercriminals and any other adversary to your corporation or organization. In these evolving times, detecting and removing malware artifacts is not enough: it's vitally important to understand how they operate in order to understand the context, the motivations, and the goals of a breach. Cuckoo Sandbox is free software that automated the task of analyzing any malicious file under Windows, macOS, Linux, and Android. Cuckoo Sandbox is an advanced, extremely modular, and 100% open source automated malware analysis system with infinite application opportunities. Analyze many different malicious files (executables, office documents, pdf files, emails, etc) as well as malicious websites under Windows, Linux, macOS, and Android virtualized environments.
  • 23
    Joe Sandbox

    Joe Sandbox

    Joe Security

    Tired of high level malware analysis? Perform one of the deepest analysis possible - fully automated or manual - from static to dynamic, from dynamic to hybrid, from hybrid to graph analysis. Rather than focus on one, use the best of multiple technologies including hybrid analysis, instrumentation, hooking, hardware virtualization, emulation and machine learning / AI. Check out our reports to see the difference. Deeply analyze URLs to detect phishing, drive by downloads, tech scam and more. Joe Sandbox uses an advanced AI based algorithm including template matching, perptual hashing, ORB feature detection and more to detect the malicious use of legit brands on websites. Add your own logos and templates to extend the detection capabilities. Interact with the sandbox through Live Interaction - directly from your browser. Click through complex phishing campains or malware installers. Test your software against backdoors, information leakage and exploits (SAST and DAST).
  • 24
    RapidScale Virtual Desktops
    Reduce worries about sensitive information being compromised through lost or stolen devices. Think of the time saved by never manually updating a device again. How about being able to say “bring it on” to bring your own device (BYOD) and “goodbye” to the blue screen of death? That’s Desktop as a Service (DaaS) and next-gen mobility. Data in cloud environments can be more secure than data on hard drives. Virtual desktops don’t get left in a cab or broken when dropped. Whether you own 20 laptops or 200,000, with DaaS, maintaining and updating machines is no longer time-consuming and expensive. People panic when a computer fails. With DaaS, an employee is back “up and running” as soon as they log in on a new device. Workers do their jobs on the tools they love, without jeopardizing security. Enterprises reduce spend by procuring less expensive hardware.
  • 25
    AP Lens

    AP Lens

    AP Lens

    AP Lens is a Sandbox Browser that isolates networks using DNS Whitelisting. We stop the attack before it reaches the network. What does AP Lens provide? - Web Filtering: Flexible and user-friendly content blocking. - Anti-Phishing: Stop look-alike domains with 100% accuracy. - Ransomware Protection: Isolate the network without affecting business applications. - Secure Remote Work: Enforce internet usage policies without VPN slowness. - No More 0-Day Attacks: Escape the limits of blacklisting with AP Lens Augmented Whitelist. - Compliant: AP Lens meets regulatory requirements requested by cybersecurity insurance policies. - One-Click Installation: No need for a lengthy setup process or updating from the user's side. - No Maintenance: Stop malware and phishing without continuous monitoring. Our team builds on over 20 years of experience in cyber security, cloud security, and information protection in industries such as private banking and the public sector.
  • 26
    Kerv DaaS
    Kerv DaaS helps you stay ahead with hosted virtual workspaces that are tailored to your business, onboarded with ease and managed efficiently. We make sure your apps and data are always safe and accessible, while you get back to work. With secure internet access from practically any browser-enabled device, you can work effectively in any flexible work environment. Offline mode means there’s no interruption when you’re on the move and without internet access. All IT and data is stored offsite in secure, purpose-built facilities. So, it’s safe from fires and floods. Your people can continue to serve customers even if you have to close your premises and you can free up office space for other uses. Monthly pricing helps you keep an eagle eye on costs, and running your IT systems with Virtual Workspace unlocks more features and greater productivity for less investment.
  • 27
    MoQuality

    MoQuality

    MoQuality

    MoQuality is a sandbox that enables end-to-end UI testing for your Android and iOS apps. Helps build robust Appium tests. No more flaky tests. Integrates with your continuous testing workflow. Stores all test artifacts (tests, builds and reports) under one dashboard. Generates visual test reports to assist with triaging and test maintenance. Enables advanced functionality over Appium open-source. Write your Appium tests in Python, Java, JavaScript (wd/webdriverio). Build and debug your Appium script on the fly with MoQuality. Run the tests locally on real devices, emulators, and simulators. Test reports are the results of test runs that are saved by the user. You can run your Appium tests locally as many times as you wish. MoQuality supports most Android and iOS real devices, emulators and simulators. We do not restrict the number of users per license. Go ahead and add all your teammates to share the test reports.
    Starting Price: $25 per month
  • 28
    Falcon Sandbox

    Falcon Sandbox

    CrowdStrike

    Falcon Sandbox performs deep analysis of evasive and unknown threats, enriches the results with threat intelligence and delivers actionable indicators of compromise (IOCs), enabling your security team to better understand sophisticated malware attacks and strengthen their defenses. Unique hybrid analysis technology detects unknown and zero-day exploits while defeating evasive malware. Uncover the full attack lifecycle with in-depth insight into all file, network, memory and process activity. Save time and make all security teams more effective with easy-to-understand reports, actionable IOCs and seamless integration. The most sophisticated analysis is required to uncover today’s evasive and advanced malware. Falcon Sandbox’s Hybrid Analysis technology exposes hidden behavior, defeats evasive malware and delivers more IOCs, to improve the effectiveness of the entire security infrastructure.
  • 29
    NayaOne

    NayaOne

    NayaOne

    NayaOne stands as your gateway to financial technology, offering a unique Sandbox as a Service platform that empowers institutions to innovate, build, and test digital solutions with unmatched speed and security. NayaOne stands as your gateway to financial technology, offering a unique Sandbox as a Service platform that empowers institutions to innovate, build, and test digital solutions with unmatched speed and security. Seamlessly connecting new technologies with existing banking systems often presents significant technical challenges. Adopting new technologies comes with the need to maintain the utmost standards of data security and regulatory compliance. Growing the business in innovative ways is riddled with risks and the majority of the changes require technology from a third party.
  • 30
    Cisco Secure Malware Analytics
    Secure Malware Analytics (formerly Threat Grid) combines advanced sandboxing with threat intelligence into one unified solution to protect organizations from malware. With a robust, context-rich malware knowledge base, you will understand what malware is doing, or attempting to do, how large a threat it poses, and how to defend against it. Secure Malware Analytics rapidly analyzes files and suspicious behavior across your environment. Your security teams get context-rich malware analytics and threat intelligence, so they’re armed with insight into what a file is doing and can quickly respond to threats. Secure Malware Analytics analyzes the behavior of a file against millions of samples and billions of malware artifacts. Secure Malware Analytics identifies key behavioral indicators of malware and their associated campaigns. Take advantage of Secure Malware Analytics's robust search capabilities, correlations, and detailed static and dynamic analyses.
  • 31
    itopia

    itopia

    itopia

    Easily equip workers with secure access to business apps and corporate data — ensuring a flexible, quickly adaptable workforce. Seamlessly manage your global, distributed workforce while leveraging itopia’s innovative automation to slash your cloud infrastructure costs and manage the environment for you. Eliminate your on-premises infrastructure and replace it with a cloud-native “one-click” solution that your Tier 1 sysadmins will quickly master, while your senior-level IT staff can focus on higher value-add initiatives. itopia Cloud Automation Stack makes it easy to segment your cloud environment and group your end-users depending on their specific needs for applications, resources, and permissions. With our wizard-based console, sysadmins can allocate the appropriate compute resources to each collection of end-users, and deliver a remote app experience (standalone Windows apps) or full-scale Windows 10 desktops.
    Starting Price: $12 per user per month
  • 32
    ToolWiz Time Freeze
    Create a virtual environment as a copy of the real system where allows an unmodified operating system with all of its installed software to run, keeping your actual system frozen and away from unwanted changes and malicious threats. Nothing bad can happen to your PC while Toolwiz Time Freeze is up and running. Run multiple operation systems (real&virtual systems) at the same time on the same PC without reboot and easily switch between them to optimize your PC resources and improve efficiency. Consolidate the management and utilization of your system’s resources to help you build a more flexible and responsive IT infrastructure. No matter what changes are made, no matter what happens, a simple restart will return things to the way they were. Modifications made to the settings can be undone, files downloaded from the web can be removed, and other unwanted changes will all can be undone when you restart your PC.
  • 33
    Shadow PC
    Shadow PC is a high-performance, cloud-based service that delivers virtual Windows computers accessible from any device. This service eliminates the need to purchase expensive hardware for intensive tasks and allows businesses to scale up without buying a fleet of devices. It supports a wide range of uses, from simple productivity apps to demanding applications like 3D modeling and video editing. Accessible from PCs, Macs, smartphones, tablets, and smart TVs, Shadow PC ensures compatibility with a wide range of devices, providing a seamless and powerful computing experience.
    Starting Price: Essential: $9.99/month/user
  • 34
    Flaneer

    Flaneer

    Flaneer

    Say goodbye to latency due to software updates. You’ll stop losing time and use it to focus on your core mission. With Flaneer, you can change your graphics or computing power to suit your needs. ‍ You can modify your configuration yourself directly in the dedicated administration area of your virtual machine. By using Flaneer, you can say stop to E-waste while reducing your ecological impact. Keep using your old devices to stream state of the art machines! We’ve all had that moment when we thought our computer was going to take off for another planet. Protecting your information is our top priority. We store your data in secure servers, audited by 3rd party security firms, and the most sensitive data is encrypted. When a new employee joins a team, the first days are dedicated to installing the project and its dependencies. With Flaneer, you eliminate this waste of time and get a work environment ready at once.
    Starting Price: €47.50 per month
  • 35
    Fortress

    Fortress

    Fortress Labs

    Fortress offers fully-isolated, secure-by-design availability environments that run “shadow” VMs of your industrial applications in order to provide unparalleled availability and resilience. The Integrity Environment offers a robust, agent-less snapshotting mechanism, which dynamically captures client-specific control system configurations, coupled with malware scanning and encryption/decryption engines that ensure the integrity and confidentiality of system backups. The execution environment contains specialized tools for actually running secondary copies of industrial control system applications within purpose-built, hardened virtual machines, “hydrated” by configuration data from the integrity environment. All components of the Fortress platform are kept on specialized infrastructure that is logically and physically separated from the client’s primary network. Whereas traditional high-availability systems are vulnerable to malicious lateral attacks.
  • 36
    integratedPRIVATE

    integratedPRIVATE

    integratedPRIVATE

    integratedPRIVATE guarantees data sovereignty and on our system your data never goes offshore. Your team will be ready to work remotely in a sudden lockdown and your off shore staff can access your server without any need for risky syncing of data. We own and operate enterprise grade servers. Giving you access to the same standard of hardware as ASX200 companies and the Australian Government. All our client servers are housed in NEXTDC’s ISO27001 rated data centres in Australia. Ensuring that your connection is fast, your data never leaves the country, and that you are protected from cyber attacks. We set up your system using Microsoft Remote Desktop Protocol (RDP), so that you can access your applications and data safely and securely using all the features of a Windows desktop computer.
    Starting Price: $260 per month
  • 37
    RollBack Rx Server

    RollBack Rx Server

    Horizon Datasys

    RollBack Rx Server Edition is a robust Windows Server backup and restores utility that enables IT, professionals, an instant backup capability that can quickly restore mission-critical systems back to any number of multiple restore points with unrivaled speeds. RollBack Rx Server Edition makes it quick and easy to safely sandbox updates and service patches with a failsafe approach to system recovery. RollBack Rx Server Edition offers unrivaled background protection and real-time recovery speeds. This allows you to store a locally backed-up sector-map repository of complete multiple instances (or “snapshots”) of the server state. These snapshots can be scheduled to occur at intervals you specify — as frequently as every minute — and can number many thousands. This continual snapshot-taking can be set to occur in the background with no perceptible impact on day-to-day server response times.
  • 38
    VMware Workstation Pro
    VMware Workstation Pro is the industry standard for running multiple operating systems as virtual machines (VMs) on a single Linux or Windows PC. IT professionals, developers and businesses who build, test or demo software for any device, platform or cloud rely on Workstation Pro. VMware Workstation Pro allows you to run multiple operating systems at once on the same Windows or Linux PC. Create real Linux and Windows VMs and other desktop, server, and tablet environments, complete with configurable virtual networking and network condition simulation, for use in code development, solution architecting, application testing, product demonstrations and more. Securely connect with vSphere, ESXi or other Workstation servers to launch, control and manage both virtual machines (VMs) and physical hosts. A common VMware hypervisor maximizes productivity and enables easy transfer of VMs to and from your local PC.
  • 39
    Apptimized Workspace
    Discover, package and test your apps in your browser. Cloud-based application packaging environment, created for application packaging professionals by application packaging professionals. The scalable, low-cost alternative to traditional thick client discovery & packaging tools. Flexible and easy-to-use environment to serve all your software packaging needs. Access everything needed to analyze, document, package, remediate and test Microsoft Win32 applications. Without the need for infrastructure or VPN, a low monthly subscription with nothing to install, maintain or configure. Apptimized Workspace is a comprehensive and instantly available packaging environment in the cloud that takes your packaging process and all related areas to a new efficiency level. Do more with Apptimized Workspace than with any existing toolset, straight out of the box.
  • 40
    SafeZone
    SafeZone is a last-mile regulation compliance evaluation solution that allows new technology to be introduced gradually to the actual production environment, without jeopardizing the safety of data. The PoC journey is not over with the selection of a new solution. In fact, the most nerve-wracking part comes right after it, when the chosen software needs to be put into action on the legacy system. We, at prooV, understood the need for an additional step before the release of new technology – and created SafeZone. SafeZone’s first-of-its-kind software creates a simulated reality for the newly installed technology, whitewashing API and database credentials and feeding it deep mirrored or real data, depending on the customer’s preferences. SafeZone’s unique system will then begin to closely monitor the new technology’s activity and create an easily accessible log on the prooV platform.
  • 41
    TR Cloud Desktop

    TR Cloud Desktop

    Tech Results

    More and more businesses are adopting a cloud-based way of working as they move to create a more flexible and remote workforce. A hosted desktop enables remote working with constant access anywhere in the world on a device connected to the internet. Are you a small business or startup looking for reliable, secure and affordable hosted desktop / DaaS solution? Contact Tech Results today. Get access to all your files and applications from anywhere using a web browser on any internet connected device. No hassle of installing or downloading anything. Try our hosted desktop solution today. Get 15-day Free Trial available. Allow access to all your files and applications from anywhere using a web browser on any internet connected device. No hassle of installing or downloading anything.
    Starting Price: £30/month/user
  • 42
    Scale Computing Platform
    SC//Platform brings faster time to value in the data center, in the distributed enterprise, and at the edge. Scale Computing Platform brings simplicity, high availability and scalability together, replacing the existing infrastructure and providing high availability for running VMs in a single, easy-to-manage platform. Run your applications in a fully integrated platform. Regardless of your hardware requirements, the same innovative software and simple user interface give you the power to run infrastructure efficiently at the edge. Eliminate mundane management tasks and save the valuable time of IT administrators. The simplicity of SC//Platform directly impacts IT with higher productivity and lower costs. Plan the perfect future by not predicting it. Simply mix and match old and new hardware and applications on the same infrastructure for a future-proof environment that can scale up or down as needed.
  • 43
    VMware vSphere
    Get the power of the enterprise workload engine. Boost workload performance, improve security and speed up innovation for your business. vSphere delivers essential services for the modern hybrid cloud. The new vSphere has been rearchitected with native Kubernetes to run existing enterprise applications alongside modern containerized applications in a unified manner. Transform on-premises infrastructure with cloud integration. Boost productivity with central management, global insights and automation. Power up with add-on cloud services. Meet the throughput and latency needs of distributed workloads by accelerating networking functions on the DPU. Free up GPU resources for faster AI/ML model training and higher complexity models.
  • 44
    Albatross Cloud

    Albatross Cloud

    TekReach Solutions

    Virtual Desktop Infrastructure (VDI) Hosting Secure, Reliable Virtual Desktop VDI in the Cloud. Access your Windows hosted desktop from anywhere: Your office, home or on coffee shop. Microsoft Office Full Suite Installed. Including Word, Excel, PowerPoint, etc. Quick, responsive, high quality VDI experience. Never Lose Your Data Again! Complete Automatic Backups with 14 day retention. Scalable Performance. Add RAM / Disk space as you need. Do you offer Business Class VDI for companies with many employees? Absolutely. We specialize in managed desktop for organizations looking to desktops for employees as a turn key solution. This includes backups, anti-virus, central management, user management, desktop customizations, software deployments. Software. Does the VDI desktop come with Microsoft Office? Yes. If you opt for Office we can have it pre-installed. Can I setup any OS on the hosted desktop? Yes, for the most part. Just tell us what operating system you need
  • 45
    Workspace ONE
    Simply and securely deliver and manage any app on any device with Workspace ONE, an intelligence-driven digital workspace platform. Workspace ONE integrates access control, application management and multi-platform endpoint management into a single platform and is available as a cloud service or on-premises deployment. Enables enterprises to maximize employee engagement and productivity by empowering employees with a personalized experience and Day One access to any app on any device. Embrace a single, cloud-native solution for unified endpoint management—for any device and any use case. Eliminate silos and manage every device and app type faster, with fewer point solutions and more capabilities. Secure devices, users, and data with conditional access, automated patching, and configuration policies to achieve a comprehensive Zero Trust security approach.
  • 46
    LISTEQ Cloud Desktop
    We provide integrated, end-to-end Cloud Desktop software for VDI/DaaS (Desktops-as-a-Service). Our software is used both hosted (in the cloud) and on-premise by MSPs, ISVs, educational and other businesses. LISTEQ’s software provides end-users with the ultimate desktop user experience centrally hosted and managed and accessible from any device. With the LISTEQ software, ISVs can fully deploy and host their applications in a fully dedicated environment (SaaS) and offer this to their end-users. It overcomes the need to build an online/browser-based app. For Educational environments, the LISTEQ software is used to handle all workspaces, especially for school/lab environments. For a more dedicated, low-cost approach LISTEQ MultiSeat is available. IT Departments of any size of business (SMB and larger) use the LISTEQ Cloud Desktop software (VDI) to easily create, deploy and manage desktops
    Starting Price: $7 per month
  • 47
    Ostia Portus

    Ostia Portus

    Ostia Software Solutions

    In many of today’s institutions, implementation of a new product idea or product enhancement takes months, if not years. This is the result of complex IT environments and infrastructure; change control and the need for production stability and reliability, security considerations etc. – the list is long. Wouldn’t it be great if one could implement a new product idea in weeks? Portus is a technology for the creation of clever test systems on demand. It tackles the challenge of making complex IT test systems available quickly and on demand by creating simulations of the required links to the back office IT systems. This enables test systems to be made available sooner thus reducing the test timeline from months (according to our reference customers) to weeks or even days. This converts to earlier delivery of new or enhanced applications with less risk and at reduced cost. Portus test systems can be created in days, on cost effective commodity hardware and software.
  • 48
    Leostream

    Leostream

    Leostream Corporation

    Connect to anything - anywhere, any time, and from any device, quickly and securely. A modern web-based UI is your centralized hub for all your remote resources. Management wants Windows, designers want macOS, and developers want Linux - support multi-OS environments with ease. Leostream works seamlessly with Teradici Cloud Access Software and PCoIP Remote Workstation Cards, providing high-quality graphics for applications running in the datacenter or the cloud. Together, Leostream and Scale Computing offer a complete VDI solution that is simple to set up, easy to manage, and cost-effective for small business. Leostream manages user-to-resource assignments and connections in large-scale enterprise environments from wherever your users roam. Build a VDI or DaaS solution your clients will love with Leostream. Leostream provides all the tools you need to build and deploy a VDI.
    Starting Price: $7.50 per user per month
  • 49
    rollApp

    rollApp

    rollApp

    Software engineering wisdom goes that porting application to a new platform takes roughly as much time as the development of the original version. That's a huge investment and a huge risk. rollApp offers our users over 200 applications which can open and edit more than 500 different types of files. Wonder what can be done? rollMyFile – service for opening any file online – is built on top of our rollmyfile.js API for opening and editing files. High fidelity editing for office documents, images and drawings, blueprints and mind maps managed by your system. Cloud makes a great platform to run desktop applications. Apps in the cloud can be used on nearly any device with a modern web browser. No need to download, install or update anything any more. On rollApp cloud platform applications are always up-to-date, secure and offer same familiar experience on any device.
    Starting Price: $8.33 per month
  • 50
    Anunta

    Anunta

    Anunta Tech

    Fully managed, cloud-hosted desktops with enterprise grade security. Fully managed Windows 10 based cloud desktop built on the inherently secure and high performing Azure cloud. Securely access data and applications at anytime from anywhere and on any device. Seamlessly adopt cloud technologies for superior end user experience. A decade of specialised experience in implementing and managing remote desktop solutions for the world’s top enterprises. From onboarding to monitoring to management of the environment, we take total control of your DaaS experience. Organizations today are adopting cloud not just to optimize cost and improve agility but for business resilience, scalability, transforming into a digital enterprise and for sustainable growth. However, most organizations find it challenging to successfully adopt cloud technologies that best suits their business needs.