Ratings and Reviews 0 Ratings
Ratings and Reviews 123 Ratings
What is V-OS Virtual Secure Element?
V-OS embodies the core patented technology from V-Key, serving as a virtual secure element that creates a secure sandbox within native mobile applications on both iOS and Android platforms. This innovative technology provides a safeguarded environment for data storage and cryptographic operations, effectively isolating these processes from the primary application functionalities. In this presentation, we will delve into a comprehensive overview of the V-OS technology and its fundamental principles. By integrating V-OS as the security foundation for your mobile app, organizations can develop a wide range of solutions that ensure security, reliability, scalability, and alignment with specific business needs. Furthermore, V-OS includes sophisticated tamper detection and responsive mechanisms, features a patented cryptographic virtual machine, and adheres to industry standards such as FIPS 140-2 Level 1 and Common Criteria EAL3+. This technology not only lowers total ownership costs but also accelerates market readiness through effortless over-the-air updates. Additionally, it provides a versatile and extensible SDK framework, enabling companies to move away from costly hardware dependencies. Ultimately, V-OS allows organizations to pursue innovation with confidence and security in the rapidly evolving digital environment, paving the way for future advancements in technology.
What is Kasm Workspaces?
Kasm Workspaces enables you to access your work environment seamlessly through your web browser, regardless of the device or location you are in.
This innovative platform is transforming the delivery of digital workspaces for organizations by utilizing open-source, web-native container streaming technology, which allows for a contemporary approach to Desktop as a Service, application streaming, and secure browser isolation.
Beyond just a service, Kasm functions as a versatile platform equipped with a powerful API that can be tailored to suit your specific requirements, accommodating any scale of operation. Workspaces can be implemented wherever necessary, whether on-premise—including in Air-Gapped Networks—within cloud environments (both public and private), or through a hybrid approach that combines elements of both. Additionally, Kasm's flexibility ensures that it can adapt to the evolving needs of modern businesses.
Integrations Supported
Audacity
Azure Virtual Desktop
Brave Browser
Chromium
Debian
Fedora CoreOS
Keycloak
LibreOffice
Maltego
Microsoft Azure
Integrations Supported
Audacity
Azure Virtual Desktop
Brave Browser
Chromium
Debian
Fedora CoreOS
Keycloak
LibreOffice
Maltego
Microsoft Azure
API Availability
Has API
API Availability
Has API
Pricing Information
Free
Free Trial Offered?
Free Version
Pricing Information
$0 Free Community Edition
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
V-KEY
Date Founded
2011
Company Location
United States
Company Website
www.v-key.com/products/v-os-virtual-secure-element/
Company Facts
Organization Name
Kasm Technologies
Date Founded
2017
Company Location
United States
Company Website
www.kasmweb.com
Categories and Features
Categories and Features
Application Virtualization
Conflict Prevention
Cross-Platform Support
Dashboard
Debugging
Incident Management
Legacy App Support
Memory Protection
Multiple App Instances
Cloud Workload Protection
Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity
Container Management
Access Control
Application Development
Automatic Scaling
Build Automation
Container Health Management
Container Storage
Deployment Automation
File Isolation
Hybrid Deployments
Network Isolation
Orchestration
Shared File Systems
Version Control
Virtualization
Container Security
Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata
Data Loss Prevention
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Desktop as a Service (DaaS)
Admin Console
Application Management
BYOL Management
Backup & Recovery
Cloud Encryption
Device Management
File Management
GPU Virtualization
Multi-Factor Authentication
Policy Management
Single Sign On
User Provisioning
DevOps
Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports
Digital Workplace
Activity / News Feed
Calendar Management
Chat / Messaging
Content Management
Document Management
Employee Directory
File Sharing
Knowledge Management
Surveys & Feedback
Task Management
Remote Desktop
Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management
Virtual Desktop (VDI)
Desktop-as-a-Service
Load Balancing
Multi-Device Support
Multi-Factor Authentication
Permissions / Access Controls
Self Service Portal
Third Party Integration
Virtualization
Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring
Web Content Filtering
Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting