Login VSI Launches Login Enterprise 5.0: Introduces Powerful Dashboards for Cost and Capacity Tracking

prnewswire | March 31, 2023 | Read time : 01:52 min


Login VSI, the industry-leading software provider of 360° proactive visibility for virtual workspaces, announced the release of Login Enterprise 5.0, the latest version of its flagship product.

This release comes with highly anticipated new features – dashboards for cost and capacity tracking that offer predictive insights to help IT organizations control cost and optimize their virtualized desktop and application environments more effectively.

As the market for cloud-based desktops and hosted applications changes, concerns regarding cost management, now and in the future, have shifted to the top of the priority list for many organizations. For years, more visibility has been needed into the capacity and, more importantly, the cost of these environments as they change over time. The dashboards included in Login Enterprise 5.0 help fill this gap by enabling IT teams to track, trend, and monitor production deployments' cost, capacity, and performance over time as environments evolve.

"Understanding the costs associated with desktop and app virtualization, both on-premises and in the cloud, has always been challenging. Login VSI's benchmarking and proactive monitoring capabilities will help customers get accurate estimates–using data from their workloads–of their costs before deploying anything. This will allow them to make data-driven decisions based on cost and price-to-performance ratios while weighing out the benefits of cloud versus on-premises workloads," says Gabe Knuth, Senior Analyst at TechTarget's Enterprise Strategy Group.

Login VSI's mission is to enhance and extend visibility into virtual desktops and applications so IT teams can make wiser, more agile, and cost-effective decisions. The real-time insight provided by the new dashboards supports cost optimization and improves performance by enabling quick issue detection and offering optics into resource utilization.

According to John Vigeant, CEO of Login VSI, "With this major release of Login Enterprise 5.0, Login VSI is the only solution in the market that brings together proactive monitoring, cost optimization, and capacity planning for virtual desktops and apps. This is the very first time in the end-user computing space that VDI and DaaS teams can identify the optimal environment to run their virtual desktop workloads from a cost and performance perspective and measure end-user experience (EUX) to price, whether on-premises or in the cloud. Early customer deployments have already resulted in more than 40% realized savings in a single month of cloud PC spend."

As an established and respected industry leader, Login VSI partners with the world's top hardware and software vendors to ensure their joint customers have the best technology available.

"I am excited to see where Login Enterprise is going. This latest release will provide data-driven metrics for dashboards that fuel the key decision-makers and enable the EUC leaders to provide reporting and justification for their technology plans for the next 1 to 3 yrs. I am glad to be a part of something that will tremendously impact the market and how decisions are driven," says Jason Willis, Practice Principal Experience at Alchemy Technology Group.

This latest release of Login Enterprise will enable partners to strengthen their business cases, improve customer satisfaction, and maximize the value delivered.

About Login VSI

Login VSI helps organizations proactively manage the performance, cost, and capacity of their virtual desktops and applications wherever they reside – traditional, hybrid, or in the cloud. Our Login Enterprise platform is 100% agentless and can be used in all major VDI and DaaS environments, including Citrix, VMware, and Microsoft. With 360° proactive visibility, IT teams can plan and maintain successful digital workplaces with less cost, fewer disruptions, and lower risk.


10 most essential performance metrics that businesses should consider when managing their virtual machines.


10 most essential performance metrics that businesses should consider when managing their virtual machines.

Related News


Aryaka's Expanded SD-WAN and SASE Offerings Bring Simplicity and Affordability to Small and Medium-Sized Enterprises

prnewswire | March 24, 2023

Aryaka®, the leader in Unified SASE solutions, today announced enhanced SD-WAN and SASE offerings specifically designed to meet the needs of small to medium-sized enterprises (SMEs). With entry pricing of under $150/site, Aryaka delivers a more comprehensive set of managed service capabilities compared to alternatives including application optimization, network security, multi-cloud connectivity, and cloud-based observability and control, all supported by lifecycle services management. Aryaka's world-class managed service experience - trusted by large enterprises and Fortune 100 companies worldwide for over a decade – is now tailored to SMEs, so they no longer must choose between affordability, performance, and ease of use when adopting SD-WAN and SASE solutions. SMEs face several challenges when it comes to networking and security, including limited budgets, a lack of skilled IT resources, and a need for operational simplicity. Based on its global private backbone, Aryaka's solutions offer an industry-unique approach to networking and security that is cost-effective, resilient, and easy to manage, helping SMEs as they increasingly adopt managed services. Aryaka combines its in-house technology with a global managed service, eliminating the vendor-provider finger-pointing that can negatively impact business outcomes. "As a customer-centric business, Aryaka both understands the specific networking and security challenges that enterprises of all sizes face and actively takes steps to deliver products and services that address those challenges," said Dennis Monner, Chief Commercial Officer of Aryaka. "No matter if 10 or 10,000 users depend on Microsoft 365, Salesforce, or access workloads in a cloud to be productive and protected from security threats, one bad experience is one too many, and SMEs deserve a first-class service experience equal to large enterprises and multi-national companies while meeting their budgetary needs. Our revamped offerings bring our highly regarded agile deployment at an affordable price point to SMEs." As a channel-led company, Aryaka empowers its partner community with its award-winning Aryaka Accelerate Partner Program. "Our tailored offerings provide a great revenue opportunity for our valued partners to expand into more markets and verticals", according to Craig Patterson, Aryaka SVP of Global Channel Sales. "We value the true revenue partnership we have and look forward to helping our partners to win the trust and business of SMEs globally with our revamped SD-WAN and SASE solutions. We strongly believe this is a win-win-win for SMEs, channel partners, and us." The announcement comes on the heels of Aryaka's recent investment in its Hyperscale Point-of-Presence (PoP) footprint, the deployment of its innovative AppAssure solution across all current and new PoPs, and the enhancement of its Last Mile Services offering by supporting cellular connectivity worldwide. About Aryaka Aryaka is the leader in fully managed SD-WAN and Unified SASE solutions and the first to deliver a Zero Trust WAN based on a Unified SASE architecture. A Gartner "Voice of the Customer" leader, Aryaka meets customers where they are to help them overcome their network and security challenges with ease and an excellent customer experience. Aryaka's flexible architecture and all-in-one service are designed to modernize enterprises of any size, enabling them to defy convention and future-proof their businesses. The company's customer base is comprised of hundreds of global enterprises, including several in the Fortune 100.

Read More


Scale Computing Awarded 24 New Badges in G2 Spring Report 2023

prnewswire | April 05, 2023

Scale Computing, the market leader in edge computing, virtualization, and hyperconverged solutions, today announced that it has been awarded an impressive 24 new badges, including two Leader badges, across the server virtualization and hyperconverged infrastructure categories in the G2 Spring Report 2023. The G2 platform assesses software solutions and services, with an emphasis on customer satisfaction and market reputation. For inclusion in the report, a product must have received 10 or more reviews. Scale Computing Platform achieved a Leader badge by receiving positive reviews from verified users compared to similar products in both the Server Virtualization and Hyperconverged Infrastructure categories. Among server virtualization products, SC//Platform achieved the highest satisfaction score, with 96% of users saying they would recommend Scale Computing Platform. In G2's Hyperconverged Infrastructure category, 100% of reviewers gave Scale Computing a 4 or 5 star rating. "Being recognized as a G2 Leader in both the server virtualization and hyperconverged infrastructure categories is highly gratifying, as customer success continues to be Scale Computing's top priority. We engineered the Scale Computing Platform to be simple to use and manage, while leveraging our patented self-healing technology to maintain maximum uptime for all applications," said Jeff Ready, CEO and co-founder of Scale Computing. "The award-winning SC//Platform eliminates complexity, lowers costs, and frees up management time. Customers at organizations of all sizes, across every vertical, appreciate this innovation, and we're very proud to receive these 24 badges from G2." See the extensive list of badges awarded to Scale Computing in G2's Spring Report, including a video of reviews read by the Scale Computing team. SC//Platform brings simplicity and scalability together, replacing the existing infrastructure and providing high availability for running workloads in a single, easy-to-manage platform. The company also recently launched a zero-touch provisioning (ZTP) feature of SC//Fleet Manager, which provides cloud-like simplicity for administrators, allowing them to centrally configure clusters of edge computing infrastructure in SC//Fleet Manager prior to nodes arriving on-premises. The ZTP feature decreases the deployment time of edge infrastructure by 90 percent or more. "Rankings on G2 reports are based on data provided to us by real software buyers," said Sara Rossio, Chief Product Officer at G2. "Potential buyers know they can trust these insights when researching and selecting software because they're rooted in vetted, verified, and authentic reviews." About Scale Computing Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Using patented HyperCore™ technology, Scale Computing Platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime, even when local IT resources and staff are scarce. Edge Computing is the fastest growing area of IT infrastructure, and industry analysts have named Scale Computing an outperformer and leader in the space, including being named the #1 edge computing vendor by CRN. Scale Computing's products are sold by thousands of value-added resellers, integrators, and service providers worldwide. When ease-of-use, high availability, and TCO matter, Scale Computing Platform is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate, G2, and TrustRadius.

Read More


With Holistic View of Layered Security Technologies, Infinitely Virtual Rolls Out Integrated, Multifaceted Lineup

prweb | April 11, 2023

Recognizing that no company is too small to be a target of cyberattacks, cloud pioneer Infinitely Virtual today introduced a series of layered security tools and technologies. Newly packaged from IV are three integrated components: IV Host, IV Manage, and the ostensible flagship in the lineup, IV Protect. IV Protect goes beyond the built-in security within E.V.E., IV’s Cloud Platform, to provide additional protection against established and emerging cyberthreats. These solutions help address various threat vectors — from weak passwords and phishing to malicious websites and uninformed users — to keep systems and data as safe as possible. IV Protect strengthens security with targeted solutions to meet any SMB’s specific cybersecurity requirements. “Where alien code is concerned, the science of acting, reacting, anticipating, eradicating and managing has evolved,” said Adam Stern, IV Founder and CEO. “The world that anti-virus/anti-malware products inhabit has morphed as well, transformed by nefarious external forces and broader, smarter responses -- digital signatures, heuristics, memory management, etc.” In concept, the products are organized like a Venn diagram, with overlapping ala carte offerings, pegged to an organization’s discrete needs. Collectively, the various elements combine technology and human experience to perform highly accurate threat hunting, monitoring, and response at scale, among other capabilities. The IV Protect suite helps rapidly identify threats -- and limit their impact -- without the need for additional staffing. Given the length of time traditional solutions have been available, bad actors have learned how to evade them, he said. With the number and intensity of high-value cyberattacks growing, technology is increasingly scrutinizing behaviors, sketching on a wider canvas and examining more variables. “IV Protect, which integrates MDR with capabilities like DNS filtering, is both an advance and a throwback: automated and high touch,” Stern said, noting that security awareness training and compliance are central to the offering. IV Protect: Drilling Down Among the capabilities integrated into IV Protect: Multifactor Authentication Technology (MFA) - Multi-factor authentication (MFA) is an access security solution used to verify a user's identity at login. It adds two or more identity-checking steps to user logins by use of secure authentication tools, providing a fast, simple, and non-disruptive authentication experience. Managed Detection and Response (MDR) - Traditional antivirus solutions are no longer sufficient to protect servers and endpoints. IV Managed Detection & Response (MDR) provides AI-powered prevention, detection, response, and threat hunting across IV- hosted servers and local user endpoints, to protect against potentially harmful threat attacks that can put data —and the business itself— at risk. DNS Filtering - IV’s DNS Filter is a cloud-based, AI-driven content filtering and threat protection service that blocks malicious websites and filters out harmful or inappropriate content. It prevents users from unknowingly accessing unsafe websites via links in an email, while giving the organization the ability to restrict access to specific websites within a local network. Email Security - IV Email Security is an integrated cloud email security solution that is fast to deploy, easy to use, and protects the organization against today’s most dangerous phishing threats. The capability delivers email security in the mailbox using anomaly detection to stop advanced phishing threats such as Business Email Compromise (BEC), ransomware, credential harvesting and more. Security Awareness Training - IV SAT helps ensure that employees serve as a strong line of defense against the latest methods of attack. A critical piece of a strong security program, this solution makes it easy to send and track training videos on a wide range of security-related topics to the people within the organization who need them most. According to ISACA expert Tan Soon Chew, “a comprehensive cybersecurity awareness program should be established and implemented to educate every person (including external vendors and their personnel) who uses, operates and manages the enterprise’s assets or data… the program’s effectiveness should be measured at regular intervals (e.g., annually).” “We at IV are taking a refreshingly honest step forward by acknowledging that AI can’t yet be trusted to protect organizations definitively,” Stern said. “IV Protect in particular argues in favor of including actual human beings to take a closer look and to parse a timeline of events. MDR includes a SOC where threat hunters -- folks in a digital war room who get these alerts -- seek to determine if they are harmless or nefarious.” About Infinitely Virtual The World's Most Advanced Hosting Environment. Infinitely Virtual is a leading provider of high-quality and affordable Cloud Server technology, capable of delivering services to any type of business, via terminal servers, SharePoint servers and SQL servers – all based on Cloud Servers. Infinitely Virtual has earned the highest rating of "Enterprise-Ready" in Skyhigh Networks’ CloudTrust™ Program for four of its offerings -- Cloud Server Hosting, InfiniteVault, InfiniteProtect and Virtual Terminal Server. Founder and CEO Adam Stern is a member of the Forbes Technology Council. Infinitely Virtual was established as a subsidiary of Altay Corporation, and through this partnership, the company provides customers with expert 24×7 technical support.

Read More