iland Secure Cloud℠ security features

Some security and compliance guidelines require an elevated level of security and reporting – and iland can meet those needs with the Advanced Security baked into our iland Secure Cloud platform

encryption

iland offers 2 options for encryption on the iland Secure Cloud℠ platform:

  • Natively, all data is encrypted at rest in the storage array.
  • For customers interested in VM encryption, holding the keys themselves, we offer that service with our partner, Hytrust. This can be selected on a VM-by-VM basis.

Either choice comes with integrated encryption reports, to fulfill the needs of security and regulatory audits.

All iland customers have included 7-day backups for their cloud workloads. On the iland Secure Cloud platform, these backups are encrypted, as well.

security alerting

With customized security alerting, individual users can set alerts to receive notifications in the console if a security scan detects a vulnerability in their environment. These alerts can be customized for different risk factors and users can enable many alerts for different security settings through the console including:

  • Anti-malware alerts
  • Computer issues (reboots and clock changes)
  • Firewall rule alert
  • Integrity Monitoring rule alert
  • Intrusion prevention and detection rule alerts
  • Log inspection rule alert
  • Web reputation rule alert

anti-virus / anti-malware

iland has integrated malware and antivirus detection in its Advanced Security offering. We perform file scans, smart scans and real-time scans both on Linux and Windows systems, preventing infected files from running and quarantining any suspicious items. With integrated reporting and alerting, keeping your cloud workloads safe is easier than ever.

Take a 14-day free trial of iland Secure Cloud℠TEST DRIVE NOW
Deep Packet Inspection

deep packet inspection

Inspecting all traffic to and from VMs enables iland to provide:

  • Intrusion detection and prevention
  • Web Application Protection from black-list sites, app-layer attacks, SQL injections and cross-site scripting
  • Application controls providing visibility into applications accessing the network

Reports covering the details of the attackers, timing, and targets are available on-demand through the iland Secure Cloud Console℠.

Confused about cloud pricing? Watch our simple videoWATCH VIDEO

log analysis, firewall events, integrity & web reputation monitoring

  • Log Analysis: Ongoing collection and analysis of log files to identify security events across the environment.
  • Firewall events: Continuous inspection of VM traffic, enabling policies that block suspicious activity.
  • Integrity Monitoring: Daily scans monitor critical OS and application files for suspicious behavior, including changes to key attributes, registry keys, contents, and access control lists
  • Web Reputation Monitoring: Armed with an industry-leading black-list, iland can block users from accessing malicious sites.
Log Analysis
Watch our full demo video for more of our console featuresWATCH NOW

Additional Resources

Leica Geosystems VMware Case Study
EMA Survey - Cloud Wars Download
Forrester Study: Is Your Cloud Provider Keeping Secrets?
iland hipaa compliant cloud hosting datasheet
What is iland compliance?
At a Glance, iland Secure Cloud