Here is our collection of Software

Unleashing the potential of technology. Innovative programs and applications that transform ideas into reality. From productivity tools to entertainment, software drives efficiency, creativity, and connectivity in the digital age. Embrace the power of software to unlock endless possibilities.

  • MICROSOFT SERVERS

    Show
  • OFFICE APPLICATIONS

    Show
  • MICROSOFT OFFICE

    Show
  • WINDOWS

    Show
  • CUSTOMIZED CRM

    Show
  • ID Card Printing Software

    Show
  • Endpoint Security

    Show
  • EDR / XDR

    Show
  • Email Security

    Show
  • Network Security

    Show
  • Cloud Security

    Show
  • SIEM & SOC

    Show
  • Industrial / OT Security

    Show
  • Fraud Prevention

    Show
  • Threat Intelligence

    Show
  • Security Platforms & Tools

    Show
  • OS & Cyber-Immune Systems

    Show
  • Backup & Recovery

    Show
  • IT Monitoring & Management

    Show

Software Products

About 62 products found for Software
Order by
  • Workload Limit: Protects up to 10 workloads total
  • Supported Platforms: VMware vSphere, Hyper-V, Proxmox VE, Nutanix AHV; physical Windows/Linux servers/workstations via Veeam Agents.
  • Backup Methods: Forever forward incremental, forward/reverse incremental backups with changed block tracking (CBT); active/synthetic full backups
  • Replication: VM replication for disaster recovery, creating bootable onsite/offsite copies powered on via native hypervisor tools
  • User Limits: Supports up to 10 Exchange Online/OneDrive for Business users; 10 Microsoft Teams; 1 TB total SharePoint Online data
  • Protected Services: Backs up Exchange Online mailboxes, SharePoint Online sites/lists, OneDrive for Business files, Microsoft Teams chats/channels/files
  • Recovery Options: Granular item-level restores (emails, files, sites); full object recovery; powerful eDiscovery search for compliance needs
  • Deployment: Installs on Windows Server 2012 R2+ (64-bit); requires 4 GB RAM minimum, 3 GB disk space plus logs; proxy for backups optional
  • Scale Limits: Restricted to up to 5 Kubernetes nodes; same core functionality as Enterprise edition but lacks production-scale support and advanced features
  • Deployment: Simple Helm chart installation into a Kubernetes cluster (e.g., namespace "kasten-io"); supports major distributions like OpenShift, Rancher, EKS, AKS
  • Core Capabilities: Policy-driven backups, application-consistent snapshots, restore/disaster recovery, multi-cloud mobility; automatic discovery of apps and dependencies
  • Interfaces: Intuitive web-based GUI dashboard, CLI, and native Kubernetes API for automation; real-time monitoring of policies and restore points
  • User Limit: Protects up to 50 Salesforce users at no cost; ideal for small organizations using Enterprise or Unlimited Salesforce editions
  • Backup Frequency: High-frequency backups as often as every 5 minutes per object, with flexible scheduling down to the object level for low RPOs
  • Deployment Flexibility: Runs anywhere—on-premises, AWS, Azure, or other clouds; multi-org management from a single console.
  • Security Features: Client-side encryption
  • Monitoring Scope: Covers up to 10 workloads
  • Core Features: Real-time alarms for proactive alerts
  • Remediation Actions: One-click fixes like removing orphaned snapshots or adding VMs to backup jobs; process monitoring
  • Reporting: Comprehensive dashboards for performance, capacity, and SLA compliance; no email customization or advanced report features.
  • Backup Types: Supports entire computer image backups, volume-level backups, and file-level backups with options for full, incremental, and differential chains
  • Recovery Options: Bare-metal recovery to same/different hardware, granular file restores, and bootable WinPE recovery media creation for disaster scenarios.
  • Deployment: Installs directly on Windows 10/11, Server 2016–2025 (64-bit); no central server needed, but integrates with Veeam Backup & Replication for management.
  • Scheduling and Automation: Configurable backup schedules, pre/post-job scripts, and entire user profile backups to avoid missing data.
  • Backup Capabilities: Entire computer (with auto-exclude of unnecessary files), volume-level block backups, file-level with masks/folders
  • Recovery Options: Bare-metal restore to same/different hardware, volume-level for failed drives/partitions
  • Kernel and Distro Support: Linux kernels 2.6.32+ using default distribution kernels; distributed as RPM/DEB packages for broad compatibility including old installations.
  • Deployment and Interface: Simple installation via console UI or veeamconfig CLI; standalone or managed by Veeam Backup & Replication; supports snapshotless mode for mounted filesystems
  • Supported macOS Versions: Compatible with macOS 11 Big Sur through macOS 15 Sequoia
  • Backup Capabilities: File-level and volume-level backups of user data/folders; APFS snapshots for consistent backups; supports incremental chains to local disks, network shares, or object storage
  • Recovery Options: Granular file restores, full volume recovery; wizard-driven interface for easy restoration; achieves 3-2-1 rule compliance with offsite targets.
  • Deployment: Standalone .pkg installer or managed via Veeam Backup & Replication/Jamf Pro; requires full disk access permission in System Settings for complete protection.
  • Multi-Tenancy: Full tenant isolation with quotas, usage tracking, and role-based access; supports unlimited tenants from a single web console.
  • Encryption Standards: End-to-end 256-bit AES encryption at source, in-flight (SSL/TLS), and at rest; customer-managed keys for compliance.
  • Deployment Options: Installs on physical/virtual servers or public clouds like Azure/IBM Cloud; Cloud Gateway requires 8 GB RAM (scales to 500 concurrent tasks), 300 MB disk, 1 Gbps+ network
  • Storage Integration: Native object storage (S3-compatible) for unlimited capacity; supports re-archiving to cloud tiers for cost efficiency.
  • Centralized Monitoring: Provides a single dashboard for visibility into customers' on-premises, hosted, or cloud workloads, including backup jobs, alarms, and RPO/SLA compliance reports.
  • Multi-Tenancy: Securely isolates tenant data with role-based access; supports companies and resellers with customizable resource allocation and self-service portals.
  • Licensing Management: Automates license generation, deployment, and usage reporting for Veeam products like Backup & Replication, ONE, and Microsoft 365; integrates with VCSP Pulse Portal.
  • API and Automation: Robust RESTful APIs for integrations with tools like ConnectWise; enables automated onboarding, billing, and support ticket creation with log bundling.
  • Immutable Backups: Uses hardened, unchangeable storage with air-gapped copies to protect against ransomware, deletion, or tampering, aligned with NIST 2.0 standards.
  • RPO/RTO Flexibility: Achieves seconds-level Recovery Point Objectives (RPO) via Continuous Data Protection (CDP); customizable Recovery Time Objectives (RTO) through orchestrated failover/failback
  • Multi-Tenancy Support: Leverages Veeam Service Provider Console (VSPC), Cloud Connect (VCC), and Disaster Recovery Orchestrator (VDRO) for scalable tenant onboarding and web-based recovery portals
  • Platform Compatibility: Replicates VMware vSphere, Hyper-V VMs to provider-side vSphere, VMware Cloud Director (VCD), or Hyper-V; supports hybrid/multi-cloud environments
  • Version Compatibility: Supports Veeam Backup for Google Cloud v7.0.0.47 with Veeam Backup & Replication (VBR) v13.0.1.180; plug-in v13.7.0.281 on Ubuntu 22.04 LTS backup
  • Hardware for Plug-in: x86-64 CPU, 8 GB RAM minimum (plus 1 GB per concurrent task), 500 MB disk for installation; requires .NET Core Runtime 8.0+ and ASP.NET Core 8.0+.
  • Proxy Requirements: 2+ vCPU cores (recommended 4+), 2 GB RAM + 1 GB per task, 750 MB disk (Windows) or 400 MB (Linux); 1 Gbps network for optimal performance.
  • Backup Appliance: 6 vCPUs, 6 GB RAM, 100 GB disk; handles up to 4 concurrent tasks (add 1 vCPU/1 GB RAM per extra task).
  • Current version: 9a (build 9.1.0.3107, released May 31, 2023); next GA planned for June 2026 per lifecycle policy.
  • Supports upgrade: from v8.0+; older versions like v8.0 U6 (2015–2018) and v7.0 are out of support.
  • VMware: vSphere/ESXi/vCenter 8.x/7.x/6.5 (English)
  • Hyper-V: Windows Server 2022/2019/2016; SCOM 2022/2019/2016.
  • Coverage: Apps, namespaces, KubeVirt VMs, PVs; auto-discovers dependencies (PVCs, ConfigMaps, Secrets); policy-driven backups.
  • Features: Application-consistent snapshots, multi-cluster replication, ransomware protection, restore validation, blueprint-based DB protection.
  • Cluster: 4 vCPU/8 GB RAM min for K10 pod; scales to 16 vCPU/32 GB for 500+ namespaces.
  • Node: x86_64/ARM64; Kubernetes 1.25-1.31; CSI driver required for snapshots.
  • Coverage: All Salesforce objects (data, metadata, attachments, reports, profiles, flows); child/parent relationships; custom fields.
  • Features: Custom schedules/high-frequency backups, granular restore/compare, sandbox seeding, archiving, data masking, encryption (built-in/AWS KMS), RBAC notifications
  • Setup: Cloud console; Salesforce Administrator account; OAuth/API v63.0+; supports multi-org RBAC (view/full admin)
  • Backup Proxy: Fully managed; handles unlimited storage/archiving; high-frequency schedules (hourly+).
  • Coverage: VMware/Hyper-V/Nutanix/Proxmox/KubeVirt VMs; agents for Windows/Linux; AWS-native backups; immutable storage; ransomware protection.
  • Performance: Scales via proxies (2+ cores CPU, 2+ GB RAM/task); backup server (6+ cores, 6+ GB RAM, 100 GB disk).
  • Backup Server: 6+ cores CPU, 6+ GB RAM base (+1 core/1 GB per task); 176 GB disk (10 GB database/catalog per 1,000 VMs).
  • Proxies/Repos: 2-4+ cores CPU, 2+ GB RAM/task; WAN accelerators need 2 cores/4 GB min, 20 GB disk
  • Backup Types: Native API policy-based image/file-level backups; immutable S3 storage (Standard, Glacier Flex/Deep Archive)
  • Recovery: Full instance restore, file-level (FAT/NTFS/ext4/XFS/Btrfs), VPC config protection free.
  • Requirements: t3.medium+ EC2 (x86_64), outbound AWS access; no VBR management needed
  • Coverage: EC2, RDS, EFS, FSx, DynamoDB, Redshift; image/file-level backups; VPC config protection.
  • Backup Capabilities: Host-level backups for VMs; agent-based for physical/cloud machines; granular file/application recovery via Veeam Explorers.
  • Replication: VM replication for low RTO disaster recovery; bootable onsite/offsite copies. ?
  • Cloud Support: Direct restore/migration to AWS, Azure; NAS backup up to 250 GB per license
  • Limits: Max 10 sockets/instances total; no GFS/tape/scale-out repo; VeeamZIP unlimited.
  • Confident Security: Offers 7-phase onboarding, design/implementation assistance per Veeam best practices, and quarterly security assessments by experts.
  • Comprehensive Incident Support: Provides 24/7 access to a dedicated Ransomware SWAT Team with 30-minute SLAs for rapid response and recovery orchestration.
  • Financial Protection:: : Includes up to $5M ransomware warranty covering recovery costs, plus Coveware-led extortion response (assessment, negotiation, decryption aid).
  • Eligibility & Tiers: Open to all customers regardless of product/edition; no restrictions apply.
  • Assessment Phase: : Identifies ransomware strain, risks, recovery options, and strain analytics like data recovery rates.
  • Negotiation Support: Handles extortion talks using threat actor data from thousands of cases; includes settlement and decryption aid
  • Response Retainer: 24/7 Coveware support for triage, forensics, post-incident docs, and up to $5M ransomware warranty
  • :
  • Unified Protection: Secures Kubernetes apps, KubeVirt VMs, and workloads via consistent policies; supports multi-cluster management with RBAC/OIDC and FIPS compliance.
  • Mobility Features: Enables seamless workload movement between on-premises, cloud, and edge; integrates CSI storage, Kanister Blueprints for databases, and GitOps/Helm installs.
  • Resilience Tools: Provides immutable air-gapped backups, ransomware defense, rapid file restores from PersistentVolumeClaims via SFTP, and cyber recovery
  • :
  • Region?locked placement policies: Policies that lock backups and copies to specific geographic regions (e.g., “EU?only,” “US?only”) to meet data?residency laws.
  • Self?describing backups: Backup data carries all metadata needed to restore anywhere in the allowed region, with no dependency on external catalogs or appliances.
  • Policy?based governance: Central policy engine for backup, retention, encryption, and immutability settings, with live dashboards to highlight policy gaps before audits.
  • Immutable, locked storage: Integration with Veeam Data Cloud Vault and hardened repositories to enforce WORM?style retention in the chosen region.
  • Veeam Intelligence (conversational AI): Built?in assistant that answers questions in natural language about job health, risks, performance, and recommended actions.
  • Predictive / early?warning insights: Machine?learning?driven early?warning signs, risk prediction, and compliance?gap detection before jobs fail.
  • Recovery?focused insights: Identifies the safest, cleanest restore points and models “blast?radius” of detected threats to guide recovery paths.
  • Data sources: Backup job logs, performance metrics, storage usage, and security scans (including Recon Scanner 3.0 in Veeam Data Platform v13).
  • Data encryption: AES 256 encryption for backup data at rest and TLS?encrypted network traffic in transit.
  • Access protection: Support for multi?factor authentication (MFA), role?based access control (RBAC), and “four?eyes” approval for sensitive operations.
  • Immutable backups: Immutable native backups that cannot be modified or deleted for a defined retention period, protecting backups from ransomware and tampering.
  • Cleanroom / safe?point recovery: Identify and recover from “clean” restore points, validated as free of known threats.
  • Virtual: VMware vSphere, Microsoft Hyper?V, Nutanix AHV
  • Physical: Windows / Linux servers, workstations
  • Cloud: AWS, Azure, Google Cloud (VMs, disks, cloud?native snapshots).
  • SaaS / apps: Microsoft 365, Salesforce, Microsoft Entra ID, Azure workloads. Backup and recovery capabilities
  • Storage class: Secure object storage backed by Microsoft Azure Blob Storage.
  • Foundation: Locally redundant storage (3 copies in one data center), 11?nines durability, “fair?use” restore behavior
  • Advanced: Zone?redundant storage, up to 12?nines durability, unlimited read/restore.
  • Immutability: Immutable by default with WORM?style object lock, time?based retention, and compliance?mode legal hold to resist ransomware and accidental deletion.
  • Protected data: Salesforce data and metadata (standard/custom objects, records, profiles, permission sets, flows, etc.).
  • Backup model: Near?continuous backups using Salesforce API; schedules configurable per object with RPO?driven policies.
  • Granular restore: individual records, files, fields, or entire objects, including hierarchy?aware parent/child restores
  • Deployment: Runs on?premises, in AWS, Azure, or as Veeam Data Cloud for Salesforce (SaaS?delivered).
  • Azure databases: Azure SQL, Cosmos DB, Azure Files
  • Infrastructure: Azure Virtual Network (VNet) configuration
  • Backup types and scheduling: Supports image?level backups (full + incremental) and cloud?native snapshots (point?in?time).
  • Recovery targets: Restore within Azure, Restore to on?premises
  • Microsoft 365 data: Exchange Online, SharePoint Online, OneDrive for Business, Microsoft Teams
  • Bulk / DR?scale restore: Fast bulk restore for large?scale incidents or tenant?level disruptions.
  • Deployment: Fully SaaS?based, no?agent for M365/Entra ID; no local Veeam server needed
  • Storage: Unlimited storage included in the per?user subscription
  • Cyber-Immune Design: Built on KasperskyOS for security by design.
  • VDI Support: Supports virtual desktop infrastructures.
  • Remote Access: Enables secure access to remote applications.
  • Centralized Management: Allows unified control of thin client devices.
  • Secure Microkernel: Uses a minimal and highly secure kernel design.
  • Component Isolation: Isolates system components to limit attack impact.
  • Policy-Based Control: Strictly controls interactions between processes.
  • Reduced Attack Surface: Limits exploitable system functions.
  • Integration Ready: Designed for embedding into third-party solutions.
  • High Performance: Optimized for fast scanning and low latency.
  • File Scanning: Scans files and objects for malicious content.
  • Data Stream Analysis: Analyzes data streams in real time.
  • Machine Learning Analysis: Uses ML models to analyze large data sets.
  • Unknown Threat Detection: Detects threats without known signatures.
  • Behavioral Monitoring: Monitors activity across systems and processes.
  • Early Warning: Value: Provides early alerts for suspicious activity.
  • Phishing Simulations: Tests employee response to phishing attacks.
  • Automated Campaigns: Runs training and simulations automatically.
  • Learning Paths: Provides structured cybersecurity training programs.
  • User Assessment: Measures employee security behavior over time
  • Global Threat Coverage: Covers threats observed worldwide.
  • Indicators of Compromise: Supplies IOCs for faster threat detection.
  • Malware Analysis: Delivers insights into malware behavior and risks.
  • Threat Context: Adds context to security alerts and incidents.
  • Behavioral Analysis: Detects abnormal user behavior patterns.
  • Account Protection: Prevents account takeover attempts.
  • Transaction Monitoring: Analyzes online payment activities.
  • Device Profiling: Identifies suspicious or risky devices.
  • Real-Time Monitoring: Continuously monitors airspace activity.
  • Drone Tracking: Tracks drone movement and flight paths.
  • Threat Identification: Identifies drone types and behavior.
  • Area Protection: Secures restricted and sensitive locations.
  • Asset Visibility: Identifies and monitors OT and ICS assets.
  • Industrial Protocol Support: Supports common industrial communication protocols.
  • Non-Intrusive Monitoring: Operates without disrupting industrial processes.
  • Centralized Management: Provides a unified view of OT security status.
  • Data Sovereignty: Ensures no security data is shared externally.
  • Threat Intelligence: Uses Kaspersky detection technologies locally.
  • Reputation Services: Provides local file and URL reputation checks.
  • Compliance Support: Meets strict regulatory and security requirements.
  • Real-Time Correlation: Correlates events to identify security incidents.
  • Threat Detection: Detects suspicious activity and potential threats.
  • Alerting: Generates alerts for critical security events.
  • Log Management: Stores and manages large volumes of log data.
  • Runtime Protection: Monitors containers for suspicious behavior during execution.
  • Kubernetes Support: Integrates with Kubernetes environments.
  • Vulnerability Detection: Identifies known weaknesses in container images.
  • Policy Enforcement: Applies security rules across container workloads.
  • Virtual Machine Security: Protects VMs from malware and advanced threats.
  • Centralized Management: Manages security policies from a single console.
  • Advanced Threat Detection: Detects sophisticated attacks on cloud workloads.
  • System Integrity Monitoring: Monitors critical system changes in cloud environments.
  • Secure Connectivity: Protects data traffic between network locations.
  • Traffic Optimization: Routes traffic based on performance and policies.
  • Centralized Management: Manages all sites from a single console.
  • Link Aggregation: Uses multiple network links for better reliability.
  • Zero-Day Protection: Detects previously unknown exploits.
  • Behavioral Analysis: Analyzes suspicious behavior to identify attacks.
  • Sandbox Analysis: Safely analyzes suspicious files in isolation.
  • Network Traffic Analysis: Detects malicious activity in network communications.
  • URL Filtering: Controls access to websites by category.
  • Real-Time Traffic Scanning: Scans web traffic as it passes through the gateway.
  • Phishing Protection: Prevents access to phishing and fake websites.
  • Malware Detection: Identifies and blocks web-delivered malware.
  • Phishing Defense: Prevents phishing and social engineering attacks.
  • Spam Filtering: Reduces unwanted and harmful email traffic.
  • Real-Time Scanning: Scans emails as they pass through the server.
  • Attachment Control: Inspects and blocks dangerous file types.
  • Malware Detection: Scans attachments and links for malware.
  • Exchange Online Security: Protects Microsoft Exchange Online mailboxes.
  • OneDrive Protection: Scans files stored in OneDrive for threats.
  • SharePoint Protection: Secures shared documents and collaboration spaces.
  • Extended Threat Detection: Identifies advanced and multi-stage cyber attacks.
  • Incident Response Support: Provides expert guidance during security incidents.
  • Centralized Visibility: Offers a unified view of detected threats.
  • Alert Prioritization: Filters and prioritizes critical security alerts.
Showing 1-48 of 62 results.
whatsapp