Ratings and Reviews 2 Ratings
Ratings and Reviews 126 Ratings
What is Multiplicity?
Our KVM switch virtualization transforms your workspace by removing the mess of cables and extra devices typically found with conventional KVM switches. This solution is perfect for professionals such as designers, editors, call center representatives, and anyone who frequently juggles a PC and a laptop, as Multiplicity makes managing several computers a breeze. You can effortlessly and securely transfer files through drag-and-drop functionality and copy and paste content between different systems. By utilizing a single keyboard and mouse, you can control multiple PCs, each with its own monitor. The system guarantees that all data exchanged between the computers is safeguarded with AES 256 encryption for added security. Experience the smooth transition of your cursor across various screens connected to different machines, which significantly boosts your productivity and efficiency. Not only does this innovative solution enhance your workflow, but it also reduces the physical space required for your technology setup, providing a cleaner and more organized environment. By integrating this technology, you can achieve a more streamlined and effective work experience.
What is Kasm Workspaces?
Kasm Workspaces enables you to access your work environment seamlessly through your web browser, regardless of the device or location you are in.
This innovative platform is transforming the delivery of digital workspaces for organizations by utilizing open-source, web-native container streaming technology, which allows for a contemporary approach to Desktop as a Service, application streaming, and secure browser isolation.
Beyond just a service, Kasm functions as a versatile platform equipped with a powerful API that can be tailored to suit your specific requirements, accommodating any scale of operation. Workspaces can be implemented wherever necessary, whether on-premise—including in Air-Gapped Networks—within cloud environments (both public and private), or through a hybrid approach that combines elements of both. Additionally, Kasm's flexibility ensures that it can adapt to the evolving needs of modern businesses.
Integrations Supported
Amazon Web Services (AWS)
Discord
Docker
GIMP
Google Authenticator
Google Chrome
Insomnia
Maltego
Microsoft Azure
Microsoft Teams
Integrations Supported
Amazon Web Services (AWS)
Discord
Docker
GIMP
Google Authenticator
Google Chrome
Insomnia
Maltego
Microsoft Azure
Microsoft Teams
API Availability
Has API
API Availability
Has API
Pricing Information
$21.24 one-time payment
Free Trial Offered?
Free Version
Pricing Information
$0 Free Community Edition
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Stardock
Date Founded
1993
Company Location
United States
Company Website
www.stardock.com/products/multiplicity/
Company Facts
Organization Name
Kasm Technologies
Date Founded
2017
Company Location
United States
Company Website
www.kasmweb.com
Categories and Features
Virtualization
Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring
Categories and Features
Application Virtualization
Conflict Prevention
Cross-Platform Support
Dashboard
Debugging
Incident Management
Legacy App Support
Memory Protection
Multiple App Instances
Cloud Workload Protection
Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity
Container Management
Access Control
Application Development
Automatic Scaling
Build Automation
Container Health Management
Container Storage
Deployment Automation
File Isolation
Hybrid Deployments
Network Isolation
Orchestration
Shared File Systems
Version Control
Virtualization
Container Security
Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata
Data Loss Prevention
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Desktop as a Service (DaaS)
Admin Console
Application Management
BYOL Management
Backup & Recovery
Cloud Encryption
Device Management
File Management
GPU Virtualization
Multi-Factor Authentication
Policy Management
Single Sign On
User Provisioning
DevOps
Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports
Digital Workplace
Activity / News Feed
Calendar Management
Chat / Messaging
Content Management
Document Management
Employee Directory
File Sharing
Knowledge Management
Surveys & Feedback
Task Management
Remote Desktop
Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management
Virtual Desktop (VDI)
Desktop-as-a-Service
Load Balancing
Multi-Device Support
Multi-Factor Authentication
Permissions / Access Controls
Self Service Portal
Third Party Integration
Virtualization
Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring
Web Content Filtering
Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting