Our built-in cloud vulnerability scanning service performs periodic penetration testing of our environment, ensuring that web servers and networks are not vulnerable to attack. The reports of these scans are available through our console to all customers of the iland Secure Cloud platform. Alerts can also be configured based on the severity of the issues discovered with the scans.
The iland Secure Cloud Console℠ supports three primary user roles, designed to provide flexibility within your organization’s cloud users. Organizational administrators and Read-Only Organizational Administrators are augmented with 7 types of Organizational Users, from Catalog Managers to Network administrators, for maximum security in your cloud.
iland offers customers of both our iland Cloud℠ and iland Secure Cloud℠ platforms the option of adding VM encryption on a VM-by-VM basis. VM encryption protects virtual machines in the event of a digital breach.
With this solution, customers hold the encryption key for their VMs, and can select which VMs to encrypt within their cloud footprint.
Whether accessing files on the road, or providing a distributed workforce access to data during a DR event, iland’s free SSL VPN provides secure access to your cloud resources whenever and wherever you are. Configuring and managing it couldn’t be easier with our iland Secure Cloud Console and wizard driven interface.
iland also offers the Cisco ASAv appliance in a variety of sizes for customers standardizing on Cisco technology, or those who require more granular controls over their network configurations. And, if you prefer to use your own favorite VPN appliance, physical or virtual, we welcome it in our environment.