security features

iland embeds secure cloud hosting capabilities within our iland Secure Cloud℠ platform, for every cloud customer.

Cloud Security Scanning

vulnerability scanning and security alerting

Our built-in cloud vulnerability scanning service performs periodic penetration testing of our environment, ensuring that web servers and networks are not vulnerable to attack. The reports of these scans are available through our console to all customers of the iland Secure Cloud℠ platform.

With customized security alerting, individual users can also set alerts to receive notifications in the console if a security scan detects a vulnerability in their environment. These alerts can be customized for different risk factors and users can enable many alerts for different security settings through the console including:

  • Anti-malware
  • Computer issues (reboots and clock changes)
  • Firewall
  • Integrity Monitoring
  • Intrusion prevention and detection
  • Log inspection
  • Web reputation
Watch our full demo video for more of our console featuresWATCH NOW

encryption

iland offers two levels of encryption on the iland Secure Cloud platform:

  • Natively, all data is encrypted at rest in the storage array.
  • For customers interested in VM encryption, holding the keys themselves, we offer that service with our partner, Hytrust. This can be selected on a per VM or per volume basis.

Both come with integrated encryption reports, to fulfill the needs of security and regulatory audits.

All iland customers have included 7-day encrypted backups for their secure cloud workloads.

anti-virus / anti-malware

iland Secure Cloud has integrated malware and antivirus detection. We perform file scans, smart scans and real-time scans both on Linux and Windows systems. Our goal is to prevent infected files from running and quarantining any suspicious items. With integrated reporting and alerting, keeping your cloud workloads safe is easier than ever.

Take a 14-day free trial of iland Secure Cloud℠TEST DRIVE NOW
Deep Packet Inspection

deep packet inspection

Inspecting all traffic to and from VMs enables iland to provide:

  • Intrusion detection and prevention
  • Web Application Protection from black-list sites, app-layer attacks, SQL injections and cross-site scripting
  • Application controls providing visibility into applications accessing the network

Reports covering the details of the attackers, timing, and targets are available on-demand through the iland Secure Cloud Console℠.

Confused about cloud pricing? Watch our simple videoWATCH VIDEO

log analysis, firewall events, integrity & web reputation monitoring

  • Log Analysis: Ongoing collection and analysis of log files to identify security events across the environment.
  • Firewall events: Continuous inspection of VM traffic, enabling policies that block suspicious activity.
  • Integrity Monitoring: Daily scans monitor critical OS and application files for suspicious behavior, including changes to key attributes, registry keys, contents, and access control lists
  • Web Reputation Monitoring: Armed with an industry-leading black-list, iland can block users from accessing malicious sites.
Log Analysis
User Access Control

user access control

The iland Secure Cloud Console supports three primary user roles to provide flexibility within your organization’s cloud users. Organizational administrators and Read-Only Organizational Administrators are augmented with 7 types of Organizational Users, from Catalog Managers to Network Administrators, for maximum security in your cloud.

VPN

Whether accessing files on the road, or providing a distributed workforce access to data during a DR event, iland’s free SSL VPN offers secure access to your cloud resources whenever and wherever you are. Configuring and managing it couldn’t be easier with our iland Secure Cloud Console and wizard driven interface.

iland also offers the Cisco ASAv appliance in a variety of sizes for customers standardizing on Cisco technology, or those who require more granular controls over their network configurations. And, if you prefer to use your own favorite VPN appliance, physical or virtual, we welcome it in our environment.

VPN
Two Factor Authentication

two-factor authentication

Our innovative iland Secure Cloud Console is now armed with two-factor authentication to ensure the security of your cloud environment, and to meet security and compliance requirements across many industries.

Additional Resources

Leica Geosystems VMware Case Study
EMA Survey - Cloud Wars Download
Forrester Study: Is Your Cloud Provider Keeping Secrets?
iland hipaa compliant cloud hosting datasheet
What is iland compliance?
At a Glance, iland Secure Cloud