iland Secure Cloud Hosting Services
Secure and Compliant Cloud Hosting
Our built-in cloud vulnerability scanning service performs periodic penetration testing of our environment, ensuring that web servers and networks are not vulnerable to attack. The reports of these scans are available through our console to all customers of the iland Secure CloudSM platform.
With customized security alerting, individual users can also set alerts to receive notifications in the console if a security scan detects a vulnerability in their environment. These alerts can be customized for different risk factors and users can enable many alerts for different security settings through the console including:
iland offers two levels of encryption on the iland Secure Cloud platform:
Both come with integrated encryption reports, to fulfill the needs of security and regulatory audits.
iland Secure Cloud has integrated malware and antivirus detection. We perform file scans, smart scans and real-time scans both on Linux and Windows systems. Our goal is to prevent infected files from running and quarantining any suspicious items. With integrated reporting and alerting, keeping your cloud workloads safe is easier than ever.
Inspecting all traffic to and from VMs enables iland to provide:
Reports covering the details of the attackers, timing, and targets are available on-demand through the iland Secure Cloud ConsoleSM.
IAM includes user management and a Console permissions structure. IAM provides granular role based access and flexibility in setting up permissions to your iland Secure Cloud environments. IAM makes it easy to see and manage all Console users within your company for maximum security in your cloud. IAM includes completely customizable permission controls to help ensure users are only able to interact with your environment the way you choose down to a very granular level.
Whether accessing files on the road, or providing a distributed workforce access to data during a DR event, iland’s free SSL VPN offers secure access to your cloud resources whenever and wherever you are. Configuring and managing it couldn’t be easier with our iland Secure Cloud Console and wizard driven interface.
iland also offers the Cisco ASAv appliance in a variety of sizes for customers standardizing on Cisco technology, or those who require more granular controls over their network configurations. And, if you prefer to use your own favorite VPN appliance, physical or virtual, we welcome it in our environment.
Our innovative iland Secure Cloud Console is now armed with two-factor authentication to ensure the security of your cloud environment, and to meet security and compliance requirements across many industries.