Ratings and Reviews 0 Ratings
Ratings and Reviews 126 Ratings
What is vSpace?
Envision a workspace inhabited by people who all depend on computers; buying these devices can be both expensive and cumbersome, particularly when issues crop up, turning them into sources of annoyance and additional costs. A smarter alternative is to optimize your configuration, saving time, money, and energy in the process. By investing in a server and deploying vSpace Pro Enterprise Edition, you can eliminate the need for numerous individual computers and host virtual desktops, typically located in a separate, quieter area. Each user is provided with a keyboard, mouse, and monitor that connect to an NComputing access device like the RX300. Connecting to your network via LAN or Wi-Fi allows each individual to access their own virtual computer that runs the latest Windows versions. The most advantageous aspect is that user data is securely stored on the server, simplifying the backup process. Additionally, with applications and operating systems centralized, you can oversee just one server instead of countless devices, significantly easing your IT management responsibilities. Not only does this method improve efficiency, but it also creates a more streamlined and organized working environment for everyone involved. This innovative approach to IT management empowers teams to focus on their core tasks without the distraction of technical difficulties.
What is Kasm Workspaces?
Kasm Workspaces enables you to access your work environment seamlessly through your web browser, regardless of the device or location you are in.
This innovative platform is transforming the delivery of digital workspaces for organizations by utilizing open-source, web-native container streaming technology, which allows for a contemporary approach to Desktop as a Service, application streaming, and secure browser isolation.
Beyond just a service, Kasm functions as a versatile platform equipped with a powerful API that can be tailored to suit your specific requirements, accommodating any scale of operation. Workspaces can be implemented wherever necessary, whether on-premise—including in Air-Gapped Networks—within cloud environments (both public and private), or through a hybrid approach that combines elements of both. Additionally, Kasm's flexibility ensures that it can adapt to the evolving needs of modern businesses.
Integrations Supported
Alpine Linux
Azure Virtual Desktop
CentOS
Discord
Docker
Google Authenticator
Kali Linux
Microsoft Edge
Microsoft Entra ID
Postman
Integrations Supported
Alpine Linux
Azure Virtual Desktop
CentOS
Discord
Docker
Google Authenticator
Kali Linux
Microsoft Edge
Microsoft Entra ID
Postman
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
$0 Free Community Edition
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
NComputing
Company Location
United States
Company Website
www.ncomputing.com/products/vSpace/vSpace%20Pro%20Enterprise%20Edition
Company Facts
Organization Name
Kasm Technologies
Date Founded
2017
Company Location
United States
Company Website
www.kasmweb.com
Categories and Features
Application Virtualization
Conflict Prevention
Cross-Platform Support
Dashboard
Debugging
Incident Management
Legacy App Support
Memory Protection
Multiple App Instances
Virtualization
Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring
Categories and Features
Application Virtualization
Conflict Prevention
Cross-Platform Support
Dashboard
Debugging
Incident Management
Legacy App Support
Memory Protection
Multiple App Instances
Cloud Workload Protection
Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity
Container Management
Access Control
Application Development
Automatic Scaling
Build Automation
Container Health Management
Container Storage
Deployment Automation
File Isolation
Hybrid Deployments
Network Isolation
Orchestration
Shared File Systems
Version Control
Virtualization
Container Security
Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata
Data Loss Prevention
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Desktop as a Service (DaaS)
Admin Console
Application Management
BYOL Management
Backup & Recovery
Cloud Encryption
Device Management
File Management
GPU Virtualization
Multi-Factor Authentication
Policy Management
Single Sign On
User Provisioning
DevOps
Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports
Digital Workplace
Activity / News Feed
Calendar Management
Chat / Messaging
Content Management
Document Management
Employee Directory
File Sharing
Knowledge Management
Surveys & Feedback
Task Management
Remote Desktop
Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management
Virtual Desktop (VDI)
Desktop-as-a-Service
Load Balancing
Multi-Device Support
Multi-Factor Authentication
Permissions / Access Controls
Self Service Portal
Third Party Integration
Virtualization
Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring
Web Content Filtering
Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting