Related Products
|
||||||
Platforms Supported
Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Kasm Workspaces was developed by a team of cybersecurity experts to meet the most demanding secure collaboration and remote workforce requirements of the US Government, but is now available for organizations of all sizes and industries. Workspaces makes use of the latest technology in high-performance rendering, workload orchestration, and devops pipelines to deliver an architecture that is highly efficient, scalable and customizable.
|
Audience
Proactive Best Practice & Security Analysis for AWS, Azure, Kubernetes, VMware & Windows & Linux OS.
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$0 Free Community Edition
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationKasm Technologies
Founded: 2017
United States
www.kasmweb.com
|
Company InformationRunecast Solutions
Founded: 2014
United Kingdom
www.runecast.com
|
|||||
Alternatives |
Alternatives |
|||||
|
||||||
|
|
|||||
|
||||||
|
|
|||||
Categories |
Categories |
|||||
Cloud Workload Protection Features
Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity
Container Security Features
Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata
Virtualization Features
Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring
Application Virtualization Features
Conflict Prevention
Cross-Platform Support
Dashboard
Debugging
Incident Management
Legacy App Support
Memory Protection
Multiple App Instances
Container Management Features
Access Control
Application Development
Automatic Scaling
Build Automation
Container Health Management
Container Storage
Deployment Automation
File Isolation
Hybrid Deployments
Network Isolation
Orchestration
Shared File Systems
Version Control
Virtualization
Data Loss Prevention Features
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Desktop as a Service (DaaS) Features
Admin Console
Application Management
Backup & Recovery
BYOL Management
Cloud Encryption
Device Management
File Management
GPU Virtualization
Multi-Factor Authentication
Policy Management
Single Sign On
User Provisioning
DevOps Features
Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports
Digital Workplace Features
Activity / News Feed
Calendar Management
Chat / Messaging
Content Management
Document Management
Employee Directory
File Sharing
Knowledge Management
Surveys & Feedback
Task Management
Remote Desktop Features
Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management
Virtual Desktop (VDI) Features
Desktop-as-a-Service
Load Balancing
Multi-Device Support
Multi-Factor Authentication
Permissions / Access Controls
Self Service Portal
Third Party Integration
Web Content Filtering Features
Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting
|
Cloud Workload Protection Features
Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity
Container Security Features
Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata
Virtualization Features
Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Data Center Management Features
Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance
GDPR Compliance Features
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
HIPAA Compliance Features
Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management
Network Monitoring Features
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
Internet Usage Monitoring
IP Address Monitoring
Real Time Analytics
Resource Management
Server Monitoring
SLA Monitoring
Uptime Monitoring
Web Traffic Reporting
PCI Compliance Features
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
Patch Management
PCI Assessment
Policy Management
Server Virtualization Features
Audit Management
Health Monitoring
Live Machine Migration
Multi-OS Virtual Machines
Patching / Backup
Performance Log
Performance Optimization
Rapid Provisioning
Security Management
Type 1 / Type 2 Hypervisor
Vulnerability Scanners Features
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection
|
|||||
Integrations
Debian
Discord
Fedora
Google Authenticator
Inkscape
Insomnia
LibreOffice
Microsoft Azure
Microsoft Edge
Microsoft Entra ID
|
Integrations
Debian
Discord
Fedora
Google Authenticator
Inkscape
Insomnia
LibreOffice
Microsoft Azure
Microsoft Edge
Microsoft Entra ID
|
|||||
|
|