EMC Avamar: Fast, efficient backup and recovery through a complete software and hardware solution. Equipped with integrated variable-length deduplication technology, Avamar facilitates fast, daily full backups for virtual environments, remote offices, enterprise applications, network-attached storage (NAS) servers, and desktops/laptops.
Automate development and database management tasks to increase productivity, optimize database performance, and reduce administrative costs. Leverage tools with built-in expertise to develop optimal application code. Monitor multiple, heterogeneous databases from a single view and analyze transactions.
Enterprise Single Sign-on enables your organization to streamline both end-user management and enterprise-wide administration of single sign-on (SSO). It bases application and system user logins on your existing Active Directory identities, so there’s no infrastructure for you to manage.
Cloudscaling is a provider of OpenStack-powered IaaS for private and hybrid cloud solutions. Our core product, Open Cloud System (OCS), provides an operating system to manage compute, storage and networking in the cloud. OCS is designed to support a new generation of cloud-based applications and provides the performance and economic benefits of leading public cloud services but is deployed in your data center under IT's control.
Dell Emergency Notification is a tool that provides ttwo-way emergency communications to help user reach your people virtually no matter where they are or the time of day, it can poll users to gather real-time data on their safety, status, or on the status of critical situations as they unfold.
REX-Ray is an open source, storage management solution designed to support container runtimes such as Docker and Mesos. REX-Ray enables stateful applications, such as databases, to persist and maintain its data after the life cycle of the container has ended.
RSA ECAT is an endpoint threat detection and response solution that exposes targeted, advanced malware, highlights suspicious activity for investigation, and instantly determines the scope of a compromise to help security teams stop advanced threats faster.