Ratings and Reviews 0 Ratings
Ratings and Reviews 127 Ratings
What is Netkiller DLP?
We enable businesses to flourish in the cloud by focusing on Cloud Security, ensuring that organizations remain unaffected by security challenges in the current post-pandemic environment. Our offerings are highly adaptable, crafted to suit the specific needs of each organization, from those requiring enterprise-grade security solutions to those seeking affiliate integration services tailored to their unique operations. Central to Collavate's functionality is its seamless integration with Google Workspace, which promotes fluid conversations, efficient iterations, and smooth asset approvals all within a unified platform. Furthermore, Netkiller ISMS boasts sophisticated features such as real-time data breach detection, instant quarantine actions, and detailed logs of data access points, providing unparalleled tracking and detection capabilities enhanced by superior AI reporting across all Google Workspace Editions. In addition, KillerID supports both individual and integrated cloud user logins, allowing users to connect from home or the office using their Google Login, alongside the flexibility to establish custom login security measures, set IP filters, and impose restrictions on access to private cloud resources. This comprehensive strategy ensures all facets of cloud security are comprehensively managed, thereby equipping businesses with the assurance needed to pursue innovation without trepidation. Moreover, our commitment to continuous improvement means we are always evolving our solutions to meet the dynamic challenges of the digital landscape.
What is Kasm Workspaces?
Kasm Workspaces enables you to access your work environment seamlessly through your web browser, regardless of the device or location you are in.
This innovative platform is transforming the delivery of digital workspaces for organizations by utilizing open-source, web-native container streaming technology, which allows for a contemporary approach to Desktop as a Service, application streaming, and secure browser isolation.
Beyond just a service, Kasm functions as a versatile platform equipped with a powerful API that can be tailored to suit your specific requirements, accommodating any scale of operation. Workspaces can be implemented wherever necessary, whether on-premise—including in Air-Gapped Networks—within cloud environments (both public and private), or through a hybrid approach that combines elements of both. Additionally, Kasm's flexibility ensures that it can adapt to the evolving needs of modern businesses.
Integrations Supported
Amazon Web Services (AWS)
Audacity
Azure Virtual Desktop
Blender
Discord
Fedora CoreOS
FileZilla Pro
Inkscape
LibreOffice
Maltego
Integrations Supported
Amazon Web Services (AWS)
Audacity
Azure Virtual Desktop
Blender
Discord
Fedora CoreOS
FileZilla Pro
Inkscape
LibreOffice
Maltego
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
$0 Free Community Edition
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Netkiller
Date Founded
2006
Company Location
United States
Company Website
www.dlp.netkiller.com
Company Facts
Organization Name
Kasm Technologies
Date Founded
2017
Company Location
United States
Company Website
kasm.com
Categories and Features
Data Loss Prevention
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Categories and Features
Application Virtualization
Conflict Prevention
Cross-Platform Support
Dashboard
Debugging
Incident Management
Legacy App Support
Memory Protection
Multiple App Instances
Cloud Workload Protection
Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity
Container Management
Access Control
Application Development
Automatic Scaling
Build Automation
Container Health Management
Container Storage
Deployment Automation
File Isolation
Hybrid Deployments
Network Isolation
Orchestration
Shared File Systems
Version Control
Virtualization
Container Security
Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata
Data Loss Prevention
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Desktop as a Service (DaaS)
Admin Console
Application Management
BYOL Management
Backup & Recovery
Cloud Encryption
Device Management
File Management
GPU Virtualization
Multi-Factor Authentication
Policy Management
Single Sign On
User Provisioning
DevOps
Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports
Digital Workplace
Activity / News Feed
Calendar Management
Chat / Messaging
Content Management
Document Management
Employee Directory
File Sharing
Knowledge Management
Surveys & Feedback
Task Management
Remote Desktop
Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management
Virtual Desktop (VDI)
Desktop-as-a-Service
Load Balancing
Multi-Device Support
Multi-Factor Authentication
Permissions / Access Controls
Self Service Portal
Third Party Integration
Virtualization
Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring
Web Content Filtering
Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting