This is your compare tray

Apps you want to compare will be listed here. Launch a head to head comparison at any time.

All categories

V2 Cloud WorkSpaces vs Workspace ONE Comparison

search
Add to Compare
Recommended for you
Cameyo
Workspot
Citrix Workspace
Pulseway
ConnectWise Automate
Splunk Enterprise

Good recommendations?

Overview

V2 Cloud is a desktop virtualization software that provides businesses with cloud desktops to facilitate remote work and...

VMware is a cloud infrastructure software that helps businesses integrate private, public, or hybrid cloud environments to...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Screenshots

Pricing

Starting from
$

60

/momonth
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based
Starting from

No info

  • Free trial available
  • No credit card required
  • Free account
  • Subscription based

User reviews

4.9

5

4

3

2

1

17

1

0

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
100%
would recommend this app

4.6

5

4

3

2

1

12

7

0

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
100%
would recommend this app

Pros

Excellent support response when I had questions or needed help with troubleshooting an issue. Great GUI for managing the user sessions and file storage.
This virtual platform is very easy to jump on and dependable. The best part is everything is dedicated for me.
We believe its an excellent product for our requirements, a cost effective fully in the Cloud IT Infrastructure.

Pros

Thank goodness for this program. It's simple to use and clean looking.
This product has great customization for MDM and can get pretty granular. Does everything you want in terms of MDM.
The thing I like most when using the application is that it is both easy to use and very easy to use.

Cons

I found it difficult to setup Teams due to the need for remote VM access to local hardware.
Their password requirements sometimes get in the way. I don't need some algorithm to decide if my passwords are too weak or not.
The only problems I have come across so far is that the download feature doesn't seem to like Excel.

Cons

It frezzes occasionally when update. I have experienced errors whem trying to back up to another computer.
Employees are still hesitant to install Workspace ONE since they are suspicious about what the software reports back to HQ.
I had difficulty during initial setup. The firewall had to be manually configured when I set it up.
  • Vendor responds to reviews
  • Last review3 months ago
  • Vendor responds to reviews
  • Last review8 months ago

Key features

  • Total features35
  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Activity/News Feed
  • Alerts / Escalation
  • Anti Virus
  • App Management
  • Application Management
  • Application Security
  • Archiving & Retention
  • Audit Trail
  • Automatic User/Device Recognition
  • BYOD Management
  • Bandwidth Monitoring
  • Baseline Manager
  • Behavior-Based Acceleration
  • Behavioral Analytics
  • Billing & Provisioning
  • Calendar Management
  • Capacity Analytics
  • Capacity Management
  • Cloud Computing
  • Collaboration Tools
  • Communication Management
  • Content Management
  • Cost Management
  • Cross Reference System
  • DaaS
  • Dashboard
  • Data Management
  • Data Migration
  • Data Storage Management
  • Demand Monitoring
  • Deployment Management
  • Desktop Virtualization
  • Desktop/Application Virtualization
  • Device Auto Discovery
  • Device Management
  • Diagnostic Testing
  • Diagnostic Tools
  • Diagnostics Tools
  • Disaster Recovery
  • Document Management
  • Employee Directory
  • Encryption
  • Endpoint Management
  • Event Logs
  • File Sharing
  • File Transfer
  • Firewalls
  • For MSPs
  • Full Transaction Diagnostics
  • Graphical User Interface
  • IP Address Monitoring
  • IT Asset Management
  • Import/Export Data
  • Incident Management
  • Internet Usage Monitoring
  • Intrusion Detection System
  • Issue Tracking
  • JCL Management
  • Knowledge Management
  • Load Balancing
  • Mobile Access
  • Multi-Cloud Management
  • Multi-Device Support
  • Multi-Platform
  • Multi-User Collaboration
  • Multiple Monitor Access
  • Namespace Management
  • Network Analysis
  • Network Monitoring
  • Network Resource Management
  • Patch Management
  • Performance Analysis
  • Performance Management
  • Performance Metrics
  • Policy Management
  • Power Management
  • Real Time Notifications
  • Real-Time Chat
  • Real-time Alerts
  • Remediation Management
  • Remote Access/Control
  • Remote Printing
  • Remote Update / Installation
  • Reporting/Analytics
  • Resource Management
  • Role-Based Permissions
  • Root Cause Analysis
  • Sarbanes-Oxley Compliance
  • Screen Sharing
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Management
  • Self Service Portal
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Signature Matching
  • Simple Network Management Protocol (SNMP)
  • Software Management
  • Supply Monitoring
  • Surveys & Feedback
  • Synchronization Scheduling
  • Task Management
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Trace individual transactions
  • Troubleshooting
  • Two-Factor Authentication
  • Uptime Reporting
  • User Management
  • VDI
  • VM Backup
  • VPN
  • Version Control
  • Virtual Machine Encryption
  • Virtual Machine Migration
  • Virtual Machine Monitoring
  • Virtual Server
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Wireless Internet Access
  • Wireless Troubleshooting
  • Workflow Approval
  • Total features125
  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Activity/News Feed
  • Alerts / Escalation
  • Anti Virus
  • App Management
  • Application Management
  • Application Security
  • Archiving & Retention
  • Audit Trail
  • Automatic User/Device Recognition
  • BYOD Management
  • Bandwidth Monitoring
  • Baseline Manager
  • Behavior-Based Acceleration
  • Behavioral Analytics
  • Billing & Provisioning
  • Calendar Management
  • Capacity Analytics
  • Capacity Management
  • Cloud Computing
  • Collaboration Tools
  • Communication Management
  • Content Management
  • Cost Management
  • Cross Reference System
  • DaaS
  • Dashboard
  • Data Management
  • Data Migration
  • Data Storage Management
  • Demand Monitoring
  • Deployment Management
  • Desktop Virtualization
  • Desktop/Application Virtualization
  • Device Auto Discovery
  • Device Management
  • Diagnostic Testing
  • Diagnostic Tools
  • Diagnostics Tools
  • Disaster Recovery
  • Document Management
  • Employee Directory
  • Encryption
  • Endpoint Management
  • Event Logs
  • File Sharing
  • File Transfer
  • Firewalls
  • For MSPs
  • Full Transaction Diagnostics
  • Graphical User Interface
  • IP Address Monitoring
  • IT Asset Management
  • Import/Export Data
  • Incident Management
  • Internet Usage Monitoring
  • Intrusion Detection System
  • Issue Tracking
  • JCL Management
  • Knowledge Management
  • Load Balancing
  • Mobile Access
  • Multi-Cloud Management
  • Multi-Device Support
  • Multi-Platform
  • Multi-User Collaboration
  • Multiple Monitor Access
  • Namespace Management
  • Network Analysis
  • Network Monitoring
  • Network Resource Management
  • Patch Management
  • Performance Analysis
  • Performance Management
  • Performance Metrics
  • Policy Management
  • Power Management
  • Real Time Notifications
  • Real-Time Chat
  • Real-time Alerts
  • Remediation Management
  • Remote Access/Control
  • Remote Printing
  • Remote Update / Installation
  • Reporting/Analytics
  • Resource Management
  • Role-Based Permissions
  • Root Cause Analysis
  • Sarbanes-Oxley Compliance
  • Screen Sharing
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Management
  • Self Service Portal
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Signature Matching
  • Simple Network Management Protocol (SNMP)
  • Software Management
  • Supply Monitoring
  • Surveys & Feedback
  • Synchronization Scheduling
  • Task Management
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Trace individual transactions
  • Troubleshooting
  • Two-Factor Authentication
  • Uptime Reporting
  • User Management
  • VDI
  • VM Backup
  • VPN
  • Version Control
  • Virtual Machine Encryption
  • Virtual Machine Migration
  • Virtual Machine Monitoring
  • Virtual Server
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Wireless Internet Access
  • Wireless Troubleshooting
  • Workflow Approval

Integrations

  • Total integrations1
  • Box
  • Dropbox Business
  • Facebook
  • GitHub
  • Google Drive
  • Jira
  • Mailchimp
  • Microsoft 365
  • Microsoft Azure
  • NetSuite
  • Opsgenie
  • PagerDuty
  • Salesforce Sales Cloud
  • ServiceNow
  • Shopify
  • Slack
  • Trello
  • Twitter
  • Zapier
  • Zendesk
  • Total integrations17
  • Box
  • Dropbox Business
  • Facebook
  • GitHub
  • Google Drive
  • Jira
  • Mailchimp
  • Microsoft 365
  • Microsoft Azure
  • NetSuite
  • Opsgenie
  • PagerDuty
  • Salesforce Sales Cloud
  • ServiceNow
  • Shopify
  • Slack
  • Trello
  • Twitter
  • Zapier
  • Zendesk

Security

  • Encryption of sensitive data at rest
  • HTTPS for all pages (web-based apps)
  • Reports/alerts for security breaches
  • Multifactor authentication options
  • Customer data removed upon service cancellation
  • Encryption of sensitive data at rest
  • HTTPS for all pages (web-based apps)
  • Reports/alerts for security breaches
  • Multifactor authentication options
  • Customer data removed upon service cancellation

V2 Cloud WorkSpaces vs. Workspace ONE

See how V2 Cloud WorkSpaces and Workspace ONE stack up against each other by comparing features, pricing, ratings, integrations, security & more.