Virtualization describes a technology in which an application, guest operating system or data storage is abstracted away from the true underlying hardware or software. A key use of virtualization technology is server virtualization, which uses a software layer called a hypervisor to emulate the underlying hardware.

This often includes the CPU's memory, I/O and network traffic. The guest operating system, normally interacting with true hardware, is now doing so with a software emulation of that hardware, and often the guest operating system has no idea it's on virtualized hardware. While the performance of this virtual system is not equal to the performance of the operating system running on true hardware, the concept of virtualization works because most guest operating systems and applications don't need the full use of the underlying hardware. This allows for greater flexibility, control and isolation by removing the dependency on a given hardware platform.

Virtualization can be viewed as part of an overall trend in enterprise IT that includes autonomic computing, a scenario in which the IT environment will be able to manage itself based on perceived activity, and utility computing, in which computer processing power is seen as a utility that clients can pay for only as needed. Virtualization is to centralize administrative tasks while improving scalability and workloads.

Virtualize your IT infrastructure with powerful open-source server virtualization platform. It also integrates out-of-the-box-tools for configuring high availability between servers, software-defined storage, networking, and disaster recovery. Easily virtualize even the most demanding Linux and Windows application workloads, and dynamically scale-out your computing and storage as your needs grow ensuring to stay adaptable for future growth of your IT infrastructure.


  • Kernel-based Virtual Machine (KVM)
  • Container-based virtualization (LXC)
  • Web-based Management Interface, CLI & RESTful API
  • Role Based Administration
  • High Availability Cluster
  • Bridged Networking
  • Multiple Authentication Sources
  • Multiple storage types supported (Ceph, Ceph FS, NFS, ZFS, Gluster, iSCSI, LVM, XFS)
  • Backup and Restore
  • Firewall
Let's talk, understand and begin