embedded security

iland embeds secure cloud hosting capabilities within our iland Secure Cloud℠ platform, for every cloud customer.

vulnerability scanning and alerting

Our built-in cloud vulnerability scanning service performs periodic penetration testing of our environment, ensuring that web servers and networks are not vulnerable to attack. The reports of these scans are available through our console to all customers of the iland Secure Cloud platform. Alerts can also be configured based on the severity of the issues discovered with the scans.

Watch our full demo video for more of our console featuresWATCH NOW

user access control

The iland Secure Cloud Console℠ supports three primary user roles, designed to provide flexibility within your organization’s cloud users. Organizational administrators and Read-Only Organizational Administrators are augmented with 7 types of Organizational Users, from Catalog Managers to Network administrators, for maximum security in your cloud.

Confused about cloud pricing? Watch our simple videoWATCH VIDEO

available VM encryption

iland offers customers of both our iland Cloud℠ and iland Secure Cloud℠ platforms the option of adding VM encryption on a VM-by-VM basis. VM encryption protects virtual machines in the event of a digital breach.

With this solution, customers hold the encryption key for their VMs, and can select which VMs to encrypt within their cloud footprint.


Whether accessing files on the road, or providing a distributed workforce access to data during a DR event, iland’s free SSL VPN provides secure access to your cloud resources whenever and wherever you are. Configuring and managing it couldn’t be easier with our iland Secure Cloud Console and wizard driven interface.

iland also offers the Cisco ASAv appliance in a variety of sizes for customers standardizing on Cisco technology, or those who require more granular controls over their network configurations. And, if you prefer to use your own favorite VPN appliance, physical or virtual, we welcome it in our environment.

Two Factor Authentication

two-factor authentication

Our innovative iland Secure Cloud Console is now armed with two-factor authentication to ensure the security of your cloud environment, and to meet security and compliance requirements across many industries.

Avoid common pitfalls: cloud lessons from other CIOsDOWNLOAD REPORT

Additional Resources

Leica Geosystems VMware Case Study
Leica Geosystems VMware Case Study
iland Secure Cloud Console Datasheet