InstallAware Application Virtualization 5.0
You'll be able to download in 5 seconds.
ABOUT InstallAware Application Virtualization
InstallAware Application Virtualization creates virtualized applications which run inside a secure sandbox on end-user systems, providing full access to all original application dependencies such as ActiveX controls and dynamic libraries, powered by a virtual file system and registry. InstallAware Virtualization is the result of collaborative effort between InstallAware and Softanics, Inc. Unlike VMware ThinApp and Microsoft App-V, InstallAware Virtualization packages do not pre-extract anything on the computer they are running on. They run immediately from a single, truly portable executable file instead, which could reside on a network location, a USB drive, or a physical hard disk. InstallAware Virtualization is also based on an agentless architecture, which eliminates the need to pre-install agent code on target devices - all that is necessary to run is the single portable executable file. Again unlike VMware or Microsoft offerings, InstallAware Virtualization is licensed royalty-free, without requiring separate client access licenses for each user. All companies need is one license per developer who will be using the toolkit to create virtualized applications. InstallAware Virtualization also includes PackageAware, a wizard which converts any application to a virtualized application based on a working setup file for the application. The original sources of the application are not required, and the application virtualization project created by PackageAware may be further modified in the main InstallAware Virtualization IDE, using common GUI development metaphors. Application virtualization technology enables users without administrator rights to run software on their systems which would ordinarily require those rights. Even if an application requires access to protected system locations, once virtualized, those requests are seamlessly redirected to the secure sandbox. This fulfills application requirements and maintains security on the target at the same time.