Other Useful Business Software
Gain Advanced Threat Protection for Your AWS Workloads Icon
Gain Advanced Threat Protection for Your AWS Workloads

Running FortiGate NGFW on AWS Graviton2 Lets You Boost Scalability With Reduced Compute Costs

FortiGate-VM delivers comprehensive security and scalable VPN connectivity for your AWS workloads, while native AWS integrations unlock broad coverage for your environment. Now with support for AWS Graviton2 instances, FortiGate lets you optimize price performance and reduce your Amazon EC2 costs by up to 20 percent. Deploy today in AWS Marketplace.
PRTG Network Monitor | Making the lives of sysadmins easier Icon
PRTG Network Monitor | Making the lives of sysadmins easier

Stay ahead of IT infrastructure issues

PRTG Network Monitor is an all-inclusive monitoring software solution developed by Paessler. Equipped with an easy-to-use, intuitive interface with a cutting-edge monitoring engine, PRTG Network Monitor optimizes connections and workloads as well as reduces operational costs by avoiding outages while saving time and controlling service level agreements (SLAs). The solution is packed with specialized monitoring features that include flexible alerting, cluster failover solution, distributed monitoring, in-depth reporting, maps and dashboards, and more.
Create and run cloud-based virtual machines. Icon
Create and run cloud-based virtual machines.

Secure and customizable compute service that lets you create and run virtual machines on Google’s infrastructure.

Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
The Voice API that just works | Twilio Icon
The Voice API that just works | Twilio

Build a scalable voice experience with the API that's connecting millions around the world.

With Twilio Voice, you can build unique phone call experiences with one API, to create, receive, control and monitor calls with just a few lines of code. Create an engaging voice experience that you can quickly scale and modify with a wide array of customization options and resources.
The Secure Workspace for Remote Work Icon
The Secure Workspace for Remote Work

Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.

Additional Details for dvbackup

Operating Systems

Linux, BSD

Languages

English

Intended Audience

System Administrators

Programming Language

C

Registered

2001-05-04

Last Updated

Categories

Backup, Video

Maintainers

schlaile

Keep Me Updated!