List of Microsoft Hyper-V Integrations
This is a list of platforms and tools that integrate with Microsoft Hyper-V. This list is updated as of March 2026.
-
1
Asigra Tigris Backup
Asigra
Empower your data protection with unmatched recovery confidence.Asigra Tigris provides comprehensive protection for your backups against emerging cyber threats, significantly improving the chances of successful data recovery and streamlining management compared to traditional backup options. By employing a unique network-based security architecture, Asigra integrates cutting-edge features such as inline antimalware, encryption, authentication, and obfuscation, which exceed the functionalities of standard backup software. With robust safeguards against relentless attackers, you can avoid costly ransom payments. The swift deployment of Asigra within your network removes the necessity for endpoint agents, making updates simpler, reducing administrative workload, and minimizing the impact on security. Whether you need to retrieve a single file from last night or restore an entire data center, you can rely on the strong recovery capabilities that Asigra provides. Its incremental forever approach allows for the restoration of backups from any point in time, while autonomic healing automatically corrects any corrupted backups, ensuring the preservation of your data. This all-encompassing solution not only secures your information but also fosters trust in your recovery capabilities and promotes a sense of security for your data management strategy. Ultimately, Asigra Tigris empowers organizations to navigate the complexities of data protection with confidence. -
2
WOLFCOM Evidence Management System
WOLFCOM
Streamline evidence management with tailored, compliant solutions today!The WOLFCOM Evidence Management System (WEMS) stands out as a powerful and intuitive software tool that meets CJIS standards, currently embraced by various police departments and security firms around the world. This innovative platform streamlines the handling of multiple file formats such as videos, audio files, pictures, and documents through its user-friendly interface. Authorized personnel have the capability to generate audit trail reports, tag assets, verify data integrity, and automatically delete files based on their agency's retention policies, among other functionalities. Engineered to accommodate all types of digital evidence—including body camera recordings, digital photographs, in-car video footage, and surveillance content—WEMS allows law enforcement officers to quickly find and assess digital proof. Understanding that each agency has unique requirements, we focus on comprehending and addressing your specific challenges to deliver customized solutions. Our dedication to personalization guarantees that WEMS adapts in tandem with the evolving needs of your department, ultimately boosting operational efficiency and enhancing the management of evidence while ensuring compliance with legal standards. With WEMS, agencies can confidently improve their evidence handling processes and maintain accountability throughout their operations. -
3
Nutanix Cloud Infrastructure
Nutanix
Revolutionize IT management with scalable, secure, and efficient solutions.Implement a strong and secure hyperconverged infrastructure that can adeptly deliver applications and data across diverse scales and cloud settings. Transform your business by utilizing innovative cloud technologies that simplify the acquisition, installation, and management of IT services. Boost the efficiency of your most essential applications by ensuring reliable and consistent performance. By maintaining data locality, you can take full advantage of the latest hardware innovations, including NVMe and RDMA technologies. Through advanced distributed consistency algorithms, data integrity and availability are preserved, providing protection against a range of threats such as data corruption, hardware failures, and complete site outages. Storage solutions can be precisely customized to meet your specific needs and can be swiftly scaled as your requirements change. Moreover, storage policies are applied logically according to individual workloads, granting enhanced flexibility rather than being limited to fixed hardware configurations. This strategy not only maximizes resource utilization but also significantly improves the overall efficiency and responsiveness of the system, allowing businesses to adapt quickly to changing demands in the market. Ultimately, this dynamic approach ensures that enterprises remain competitive in a rapidly evolving technological landscape. -
4
StarWind Virtual HCI Appliance
StarWind
Unlock powerful virtualization with our software-driven hyperconverged solution!Discover the benefits of the StarWind hyperconverged appliance without the requirement to buy our specialized hardware; instead, you can obtain the software along with the entire range of components that power our virtualization platform, which is conveniently pre-packaged for installation on your current hardware setup. You will have the option to select from numerous supported hypervisors like VMware vSphere, Microsoft Hyper-V, or our tailored variant of KVM, complemented by our proprietary storage virtualization solution, StarWind Virtual SAN, which effectively transmits data using the dependable iSCSI protocol or the cutting-edge NVMe-oF with RDMA technology, whenever feasible, all overseen by a user-friendly web interface that incorporates AI-driven telemetry and a "call home" functionality for improved support. Make sure to schedule a demonstration of the Virtual HCI Appliance at your earliest convenience! Our experienced sales engineers are enthusiastic about helping you grasp the extensive feature set, the potential performance metrics your hardware can reach, any limitations you might face, and the specific support parameters associated with the virtual HCI appliance as opposed to the physical model. By doing so, you can make a well-informed choice that aligns perfectly with the requirements of your organization, ensuring that you derive maximum value from your investment. Engaging with us today will put you on the path to optimizing your virtualization strategy effectively. -
5
ReportPortal
ReportPortal
Unlock insights, enhance quality, and streamline testing efficiency.Investigate the reasons for failures immediately following the completion of the testing phase. Generate concise and comprehensible reports for your team members. Leverage machine learning-powered auto-analyzers to explore the factors contributing to the failures. Aggregate test results from various platforms, frameworks, and programming languages, ensuring that actionable insights are provided. By utilizing machine learning algorithms, you can reveal trends within the test data, pinpoint the root causes of failures, and predict future testing results. Complement the automated analysis with a manual review of test logs and new failure trends observed in the most recent test executions. Facilitate automated decision-making in release pipelines by following established testing standards and outcomes. Display test results in a manner that enhances the tracking of trends, allows for the identification of patterns, generates insights, and supports well-informed business decisions. Conduct regular evaluations of your product's status and automate release choices using Quality Gates to improve both efficiency and reliability. This comprehensive strategy not only simplifies the testing process but also plays a vital role in elevating the overall quality of the product while ensuring teams remain informed and proactive. -
6
Azure Marketplace
Microsoft
Unlock cloud potential with diverse solutions for businesses.The Azure Marketplace operates as a vast digital platform, offering users access to a multitude of certified software applications, services, and solutions from Microsoft along with numerous third-party vendors. This marketplace enables businesses to efficiently find, obtain, and deploy software directly within the Azure cloud ecosystem. It showcases a wide range of offerings, including virtual machine images, frameworks for AI and machine learning, developer tools, security solutions, and niche applications designed for specific sectors. With a variety of pricing options such as pay-as-you-go, free trials, and subscription-based plans, the Azure Marketplace streamlines the purchasing process while allowing for consolidated billing through a unified Azure invoice. Additionally, it guarantees seamless integration with Azure services, which empowers organizations to strengthen their cloud infrastructure, improve operational efficiency, and accelerate their journeys toward digital transformation. In essence, the Azure Marketplace is crucial for enterprises aiming to stay ahead in a rapidly changing technological environment while fostering innovation and adaptability. This platform is not just a marketplace; it is a gateway to unlocking the potential of cloud capabilities for businesses worldwide. -
7
Plixer Replicator
Plixer
Streamline data replication, enhance security, optimize network management.Plixer Replicator is a specialized networking device that efficiently collects, replicates, and disseminates UDP data streams from various exporting sources to multiple collection systems, enhancing the effectiveness of security and management operations. By simplifying the setup and eliminating the need for intricate configurations on routers or switches, it helps maintain the integrity of the infrastructure while reducing operational costs. This device is suitable for both hardware and virtual platforms, such as ESX, Hyper-V, and KVM. Its sophisticated data forwarding capabilities allow a single UDP stream to be sent to several endpoints, optimizing the performance of analytical tools. Additionally, Plixer Replicator strengthens system resilience by distributing logs and information across various repositories, which complicates the efforts of cybercriminals trying to erase their digital footprints. The solution is equipped with an intuitive web interface and a robust command-line interface, making configuration and management straightforward for network administrators. Furthermore, its ability to adapt to different environments and its user-centric design contribute to making Plixer Replicator a vital asset in the realm of contemporary network management. Ultimately, it combines versatility with high performance, ensuring that organizations can effectively monitor and secure their networks. -
8
Cyfin
Wavecrest
Streamline insights, boost teamwork, and enhance performance effortlessly.Cyfin serves as an advanced tool for tracking employee web usage and scrutinizing their online behavior, adeptly filtering out unnecessary information to deliver a concise overview of user engagement. Featuring a wide range of prebuilt reports in user-friendly formats, organizations can swiftly access valuable insights, enabling them to share preformatted reports either manually or through automated distribution, while also allowing for the rapid creation of custom reports that greatly reduce the analysis time. The platform guarantees comprehensive investigative audits by recording every link users visit and the exact search queries they enter, facilitating the categorization of user behavior and streamlining extensive data analysis. Moreover, Cyfin fosters improved teamwork by ensuring essential information is disseminated to the right individuals, promoting informed, collaborative decision-making that addresses both interpersonal dynamics and technical hurdles across the organization. This feature not only aids in strategic planning but also cultivates a work environment rooted in accountability and transparency, which ultimately enhances overall organizational performance. Additionally, by integrating data-driven insights into daily operations, Cyfin empowers teams to adapt more effectively to evolving challenges and seize new opportunities. -
9
UnityOneCloud
UnitedLayer
Streamline your multicloud management with unparalleled flexibility and control.UnityOneCloud is a versatile SaaS platform designed for the management of multicloud environments, focusing on hybrid cloud architectures that include data center cabinets, power distribution units (PDUs), bare-metal servers, networking devices, containers, mesh services, and serverless frameworks across both private clouds like VMware, Hyper-V, and OpenStack, as well as public clouds such as AWS, GCP, and Azure. It features an extensive array of integrated tools for monitoring, visualization, management, auditing, and automating DevOps workflows, ensuring a streamlined user experience when navigating complex hybrid cloud infrastructures. A key differentiator for UnityOneCloud is its ability to effectively oversee both traditional data centers and cloud platforms, which is vital for organizations moving toward cloud-centric strategies or updating their IT systems. Moreover, the platform enhances observability of multi-cloud mesh services through its compatibility with technologies like Istio, AWS App Mesh, and Google Anthos, enabling effective management of sophisticated hybrid IT environments. It also prioritizes security compliance and operational efficiency, making UnityOneCloud an indispensable resource for enterprises looking to maximize the potential of their multicloud setups. With its robust capabilities, it empowers businesses to adapt quickly to changing technological landscapes while maintaining control over their infrastructure. -
10
MasterDC
MasterDC
Reliable IT solutions for your business's infrastructure needs.MasterDC, an IT infrastructure provider headquartered in the Czech Republic, specializes in managed services, cloud solutions, and premium hosting tailored for enterprise clients. With state-of-the-art data centers situated in Prague and Brno, the firm has earned the trust of businesses and organizations for nearly three decades. Their comprehensive array of offerings includes dedicated servers, VPS hosting, cloud servers, server housing, and a variety of managed services. MasterDC is proficient in utilizing an array of technologies like Kubernetes, Docker, Ceph, Hyper-V, and Proxmox VE, effectively catering to diverse infrastructure demands. The company places a strong emphasis on robust networking and security protocols, providing solutions such as AWS Direct Connect, firewall safeguards, DDoS mitigation strategies, log management, and SIEM services to ensure the safety of its clients. In terms of data storage solutions, MasterDC offers options like Nextcloud hosting, data replication, and server backups, facilitating streamlined information management for organizations. Their database solutions encompass database as a service, Elasticsearch, Galera Cluster, and optimization services, which work together to enhance data handling and performance. Furthermore, MasterDC remains committed to continuous adaptation and innovation in the rapidly changing technology environment to fulfill the evolving needs of their clients. This dedication to progress ensures they remain a leader in the IT infrastructure sector. -
11
OpenText Server Backup
OpenText
Comprehensive backup solution for secure, rapid data recovery.OpenText Server Backup delivers a thorough and secure method for organizations to protect their physical, virtual, and legacy environments, offering versatile choices for deployment whether on-site, in the cloud, or a hybrid of both. The platform is equipped with capabilities such as fast, near-zero-downtime recovery via bare-metal restores, alongside file and application-aware recovery options, enabling smooth cloud failover and automated failback at the touch of a button. Administrators benefit from a centralized interface that oversees all functionalities, which can be complemented by integrated hardware appliances or virtual machine-based setups. The system supports customizable scheduling, featuring forever-incremental backups and immutable, hourly snapshots, along with comprehensive ransomware scanning, alert notifications, and remediation processes to uphold data integrity. Furthermore, it ensures strong protection for VMware and Hyper-V infrastructures, achieving recovery time objectives (RTOs) as short as two minutes, while also enabling recovery of Microsoft application data to restore systems to their full operational capacity, as well as allowing for the targeted restoration of specific files, folders, or virtual machines to satisfy various recovery requirements. Overall, this multifaceted strategy guarantees that businesses can sustain operational continuity and rapidly bounce back from interruptions, reinforcing their resilience against potential data loss. -
12
OpenText Availability
OpenText
Reliable disaster recovery with seamless failover and encryption.OpenText Availability provides ongoing byte-level replication for physical, virtual, and cloud infrastructures, capturing real-time changes to achieve a Recovery Point Objective of just seconds, while also ensuring the availability of duplicated Windows and Linux servers at remote locations to minimize downtime. In the event of a failure, it supports both automated and manual failover options, complete with integrated heartbeat monitoring and DNS management, and allows for a seamless failback process once systems are restored. Data security is enhanced through AES 256-bit encryption during data transmission, and the use of three tiers of compression alongside bandwidth-throttling features mitigates the effect on network resources. An extensive API enables smooth integration with a variety of applications, while built-in alerting, reporting, and non-disruptive failover testing empower administrators to monitor system health, troubleshoot issues, and validate disaster recovery plans without disrupting ongoing operations. OpenText Availability is also designed to be compatible with any hypervisor, including VMware ESXi/vSphere and Microsoft Hyper-V, and integrates effortlessly with all leading cloud platforms, positioning it as a flexible option for various IT environments. This adaptability not only promotes business continuity but also bolsters resilience against the challenges presented by rapidly changing technologies, ensuring organizations can effectively navigate their IT landscapes. -
13
Sangfor aStor
Sangfor
Unified storage solution for optimized performance and reliability.Sangfor aStor is a cutting-edge software-defined storage solution that integrates block, file, and object storage into a unified, elastically scalable resource pool, harnessing a fully symmetrical distributed architecture to enable on-demand provisioning of high-performance and cost-efficient storage tiers that meet diverse service requirements. This system can be implemented as an all-in-one hardware-software package or as independent software, scaling from a basic configuration of three commodity x86 nodes to extensive cloud-scale clusters with thousands of nodes, facilitating EB-level capacity expansion. Through its multi-node parallel processing and advanced caching strategies—including RDMA, SSD hot-data caching, and data layering—it delivers remarkable throughput, IOPS, and performance for small I/O operations, significantly boosting cache hit rates up to 90% and enhancing small I/O processing by as much as 65%. Moreover, its distributed metadata management allows for the effective management of billions of files without noticeable latency, solidifying its position as a powerful solution for contemporary storage dilemmas. In conclusion, Sangfor aStor emerges as a dynamic and efficient choice for enterprises aiming to refine their storage architecture while ensuring scalability and performance. -
14
Dell EMC NetWorker
Dell Technologies
Empower your enterprise with seamless, adaptable data protection solutions.Leverage Dell EMC NetWorker software for robust backup and recovery solutions specifically designed for your enterprise applications and databases. With its centralized management capabilities, NetWorker enables you to implement optimal data protection strategies that align with your needs, including features like deduplication, disk or tape backups, snapshots, and replication, along with NAS support. It effectively safeguards both physical and virtual infrastructures, accommodating environments such as VMware and Microsoft Hyper-V. Whether your data resides in on-premises data centers or cloud platforms, NetWorker guarantees a seamless, enterprise-level user experience. Its cloud functionalities make it an ideal choice for ensuring that your data is consistently protected across different environments. Furthermore, NetWorker is available as a virtual edition or as part of the Dell EMC Data Protection Suite, which provides a wide array of data protection software solutions customized to fit your organization’s specific requirements. This adaptability and comprehensive feature set solidify NetWorker’s position as an indispensable resource for contemporary data management, catering to the evolving landscape of IT needs. -
15
Catalogic DPX
Catalogic Software
Secure, restore, and manage your data with confidence.Discover effective, prompt, and cost-efficient methods for safeguarding and restoring your data. Protect your valuable information against accidental deletions, natural disasters, and cyber threats such as ransomware. Enjoy quick recovery options straight from disk, tape, or cloud storage. Our agentless backup technology optimizes virtual environments, enabling the restoration of individual files or complete directories from platforms like VMware and Microsoft Hyper-V without requiring additional agents. In addition, enhancements to vStor, our cutting-edge software-defined backup solution, now feature configuration management via an HTML5 interface, more efficient replication processes, and S3 Object Lock capabilities to protect cloud backups from early deletions and ransomware threats. Moreover, we've broadened our cloud storage backup and archiving services to encompass Backblaze B2 Cloud Storage with S3 Object Lock, as well as support for Amazon S3 Glacier and Glacier Deep Archive, providing enhanced security for your essential data assets. With these innovations, you can have greater confidence in the resilience and effectiveness of your backup and recovery strategies, ensuring peace of mind in data management. -
16
CipherTrust Tokenization
Thales Cloud Security
Simplify compliance, secure data, and enhance operational efficiency.CipherTrust Tokenization greatly reduces the costs and effort required to comply with security policies and regulations like PCI DSS, while also offering a straightforward method for protecting other sensitive information such as personally identifiable information (PII). While the market lacks universally accepted standards for tokenization, most solutions can be divided into two primary types: vaultless and vaulted tokenization, both designed to secure and anonymize sensitive data effectively. This tokenization software can be implemented across various environments, including traditional data centers, expansive big data infrastructures, or cloud services. By adopting tokenization, businesses can remove cardholder data from the PCI DSS compliance scope with minimal investment and effort, resulting in substantial savings on compliance-related costs. In the current landscape of IT infrastructures, ensuring the safe management of PII is paramount. With CipherTrust tokenization, organizations can protect PII efficiently, avoiding the typical complexities of encryption key management that often challenge software developers, thus optimizing data security workflows. This cutting-edge approach not only simplifies the compliance process but also bolsters overall data governance strategies, ultimately promoting a more secure handling of sensitive information. Moreover, it allows organizations to focus on their core business operations while maintaining high standards of data security.