Skip to Navigation
Skip to Navigation
Introducing G2.ai, the future of software buying.
Try now
G2 - Business Software Reviews
Search for software, category
Software
Expand/Collapse Software
Services
Expand/Collapse Services
G2 for Business
Expand/Collapse vendor
For Marketers
Enhance your G2 profile and reach in-market buyers
For Sales
Find, engage, and convert in-market buyers
For Services
Reach companies that need you, when they’re ready to buy
For Investments
Gain access to real-time software trends
Deals
Language Selector
EN
More Language Options
Choose a language
Deutsch
Français
Português
Español
Write a Review
Join or Log In
Search
Search Software and Services
Language Selector
Choose a language
Deutsch
Français
Português
Español
Expand/Collapse
Home
...
Privileged Access Management (PAM) Software
SecureLink Enterprise Access
SecureLink Enterprise Access Discussions
Can SecureLink run on VMware or Hypervisor?
G2
Verified User
•
about 6 years ago
Can SecureLink run on VMware or Hypervisor?
Compatibility
Privileged Access Management (PAM) Software
1 comment
1
Looks like you’re not logged in.
Users need to be logged in to answer questions
Log In
Official Response
SecureLink Enterprise Access
Read reviews
DT
Loading...
Dominick T.
•
about 6 years ago
Digital Marketing
0
0
Answered
about 6 years
ago
Yes. Both VMware and Hypervisor are supported and we offer the Server in two compatible formats including .OVA and ISO.
delete
edit
Looks like you’re not logged in.
Users need to be logged in to write comments
Log In
Reply
Related Discussions
G2
about 1 year ago
How is JumpCloud redefining identity and access management in hybrid IT environments for tech companies?
4 Upvotes
1
G2
over 1 year ago
What is JumpCloud used for?
4 Upvotes
3
G2
over 2 years ago
JumpCloud is a cloud-based directory platform that provides secure identity and access management solutions. It is designed to help organizations manage user identities, devices, and access to IT resources securely. JumpCloud implements various security measures, including encryption, multi-factor authentication, and compliance with industry standards, to ensure the protection of data and user information. However, like any security solution, its effectiveness also depends on how it is configured and used by the organization.
3 Upvotes
2
Hunting for software
insights
?
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
or continue with
LinkedIn
Google
Google
By proceeding, you agree to our
Terms of Use
and
Privacy Policy