Here is our collection of Cloud Security

Discover our premium range of IT products and solutions for businesses. ICTECH Distribution offers high-quality hardware, software, and networking equipment to power your enterprise.

Cloud Security Products

About 12 products found for Cloud Security
Order by
  • Scale Limits: Restricted to up to 5 Kubernetes nodes; same core functionality as Enterprise edition but lacks production-scale support and advanced features
  • Deployment: Simple Helm chart installation into a Kubernetes cluster (e.g., namespace "kasten-io"); supports major distributions like OpenShift, Rancher, EKS, AKS
  • Core Capabilities: Policy-driven backups, application-consistent snapshots, restore/disaster recovery, multi-cloud mobility; automatic discovery of apps and dependencies
  • Interfaces: Intuitive web-based GUI dashboard, CLI, and native Kubernetes API for automation; real-time monitoring of policies and restore points
  • Multi-Tenancy: Full tenant isolation with quotas, usage tracking, and role-based access; supports unlimited tenants from a single web console.
  • Encryption Standards: End-to-end 256-bit AES encryption at source, in-flight (SSL/TLS), and at rest; customer-managed keys for compliance.
  • Deployment Options: Installs on physical/virtual servers or public clouds like Azure/IBM Cloud; Cloud Gateway requires 8 GB RAM (scales to 500 concurrent tasks), 300 MB disk, 1 Gbps+ network
  • Storage Integration: Native object storage (S3-compatible) for unlimited capacity; supports re-archiving to cloud tiers for cost efficiency.
  • Centralized Monitoring: Provides a single dashboard for visibility into customers' on-premises, hosted, or cloud workloads, including backup jobs, alarms, and RPO/SLA compliance reports.
  • Multi-Tenancy: Securely isolates tenant data with role-based access; supports companies and resellers with customizable resource allocation and self-service portals.
  • Licensing Management: Automates license generation, deployment, and usage reporting for Veeam products like Backup & Replication, ONE, and Microsoft 365; integrates with VCSP Pulse Portal.
  • API and Automation: Robust RESTful APIs for integrations with tools like ConnectWise; enables automated onboarding, billing, and support ticket creation with log bundling.
  • Immutable Backups: Uses hardened, unchangeable storage with air-gapped copies to protect against ransomware, deletion, or tampering, aligned with NIST 2.0 standards.
  • RPO/RTO Flexibility: Achieves seconds-level Recovery Point Objectives (RPO) via Continuous Data Protection (CDP); customizable Recovery Time Objectives (RTO) through orchestrated failover/failback
  • Multi-Tenancy Support: Leverages Veeam Service Provider Console (VSPC), Cloud Connect (VCC), and Disaster Recovery Orchestrator (VDRO) for scalable tenant onboarding and web-based recovery portals
  • Platform Compatibility: Replicates VMware vSphere, Hyper-V VMs to provider-side vSphere, VMware Cloud Director (VCD), or Hyper-V; supports hybrid/multi-cloud environments
  • Coverage: Apps, namespaces, KubeVirt VMs, PVs; auto-discovers dependencies (PVCs, ConfigMaps, Secrets); policy-driven backups.
  • Features: Application-consistent snapshots, multi-cluster replication, ransomware protection, restore validation, blueprint-based DB protection.
  • Cluster: 4 vCPU/8 GB RAM min for K10 pod; scales to 16 vCPU/32 GB for 500+ namespaces.
  • Node: x86_64/ARM64; Kubernetes 1.25-1.31; CSI driver required for snapshots.
  • Coverage: All Salesforce objects (data, metadata, attachments, reports, profiles, flows); child/parent relationships; custom fields.
  • Features: Custom schedules/high-frequency backups, granular restore/compare, sandbox seeding, archiving, data masking, encryption (built-in/AWS KMS), RBAC notifications
  • Setup: Cloud console; Salesforce Administrator account; OAuth/API v63.0+; supports multi-org RBAC (view/full admin)
  • Backup Proxy: Fully managed; handles unlimited storage/archiving; high-frequency schedules (hourly+).
  • Region?locked placement policies: Policies that lock backups and copies to specific geographic regions (e.g., “EU?only,” “US?only”) to meet data?residency laws.
  • Self?describing backups: Backup data carries all metadata needed to restore anywhere in the allowed region, with no dependency on external catalogs or appliances.
  • Policy?based governance: Central policy engine for backup, retention, encryption, and immutability settings, with live dashboards to highlight policy gaps before audits.
  • Immutable, locked storage: Integration with Veeam Data Cloud Vault and hardened repositories to enforce WORM?style retention in the chosen region.
  • Storage class: Secure object storage backed by Microsoft Azure Blob Storage.
  • Foundation: Locally redundant storage (3 copies in one data center), 11?nines durability, “fair?use” restore behavior
  • Advanced: Zone?redundant storage, up to 12?nines durability, unlimited read/restore.
  • Immutability: Immutable by default with WORM?style object lock, time?based retention, and compliance?mode legal hold to resist ransomware and accidental deletion.
  • Azure databases: Azure SQL, Cosmos DB, Azure Files
  • Infrastructure: Azure Virtual Network (VNet) configuration
  • Backup types and scheduling: Supports image?level backups (full + incremental) and cloud?native snapshots (point?in?time).
  • Recovery targets: Restore within Azure, Restore to on?premises
  • Microsoft 365 data: Exchange Online, SharePoint Online, OneDrive for Business, Microsoft Teams
  • Bulk / DR?scale restore: Fast bulk restore for large?scale incidents or tenant?level disruptions.
  • Deployment: Fully SaaS?based, no?agent for M365/Entra ID; no local Veeam server needed
  • Storage: Unlimited storage included in the per?user subscription
  • Runtime Protection: Monitors containers for suspicious behavior during execution.
  • Kubernetes Support: Integrates with Kubernetes environments.
  • Vulnerability Detection: Identifies known weaknesses in container images.
  • Policy Enforcement: Applies security rules across container workloads.
  • Virtual Machine Security: Protects VMs from malware and advanced threats.
  • Centralized Management: Manages security policies from a single console.
  • Advanced Threat Detection: Detects sophisticated attacks on cloud workloads.
  • System Integrity Monitoring: Monitors critical system changes in cloud environments.
Showing 1-12 of 12 results.
whatsapp