Company Website
Company Website

Ratings and Reviews 151 Ratings

Total
ease
features
design
support

Ratings and Reviews 55,297 Ratings

Total
ease
features
design
support

Media

Media

Integrations Supported

Aiven for PostgreSQL
ClickHouse
CloudPanel
UTunnel VPN and ZTNA
AUSIS
Algonomy
Big Sofa Technologies
ConfidentialMind
DriveHR
Grace Enterprise AI Platform
Kriptos
Mbed OS
Nasuni
Proficio
RenderMan
SOLIXCloud
SecureW2
Sumo Logic
ThreatWatch
Trustero

Integrations Supported

Aiven for PostgreSQL
ClickHouse
CloudPanel
UTunnel VPN and ZTNA
AUSIS
Algonomy
Big Sofa Technologies
ConfidentialMind
DriveHR
Grace Enterprise AI Platform
Kriptos
Mbed OS
Nasuni
Proficio
RenderMan
SOLIXCloud
SecureW2
Sumo Logic
ThreatWatch
Trustero

API Availability

Has API

API Availability

Has API

Pricing Information

$4 per month
Free Trial Offered?
Free Version

Pricing Information

Free ($300 in free credits)
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Kamatera

Date Founded

1995

Company Location

United States

Company Website

www.kamatera.com

Company Facts

Organization Name

Google

Date Founded

1998

Company Location

United States

Company Website

cloud.google.com

Categories and Features

Cloud Management

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

Cloud Storage

Access Control
Archiving & Retention
Backup
Data Migration
Data Synchronization
Encryption
File Sharing
Version Control

Dedicated Server Hosting

24/7 On-site Support
Built-in Backup Drives
DDOS Protection
IMPI Access
Off Server Backups
Root Level
SSD Storage
Uptime SLA

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Infrastructure-as-a-Service (IaaS)

Analytics / Reporting
Configuration Management
Data Migration
Data Security
Load Balancing
Log Access
Network Monitoring
Performance Monitoring
SLA Monitoring

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Server Backup

Backup Scheduling
Bare-Metal Restore
Compression
Continuous Backup
Differential Backup
Disaster Recovery
Encryption
Incremental Backup
VM Backup

Server Management

CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring

VPS Hosting

Access Control / Permissions
FTP
Managed VPS
Multi-Server Management
One-Click Apps
Root Access
SSD Storage
Unmanaged VPS
Upload Custom ISO

Web Hosting

Cloud Hosting
DDOS Protection
Dedicated Hosting
Email Hosting
Managed Hosting
Multiple Datacenter Locations
Private SSL
SSD Storage
Server Backups
Shared Website Hosting
Unlimited Bandwidth Option
VPS
Website Builder

Categories and Features

Application Development

Access Controls/Permissions
Code Assistance
Code Refactoring
Collaboration Tools
Compatibility Testing
Data Modeling
Debugging
Deployment Management
Graphical User Interface
Mobile Development
No-Code
Reporting/Analytics
Software Development
Source Control
Testing Management
Version Control
Web App Development

Artificial Intelligence

Chatbot
For Healthcare
For Sales
For eCommerce
Image Recognition
Machine Learning
Multi-Language
Natural Language Processing
Predictive Analytics
Process/Workflow Automation
Rules-Based Automation
Virtual Personal Assistant (VPA)

Big Data

Collaboration
Data Blends
Data Cleansing
Data Mining
Data Visualization
Data Warehousing
High Volume Processing
No-Code Sandbox
Predictive Analytics
Templates

Cloud Management

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

Cloud Storage

Access Control
Archiving & Retention
Backup
Data Migration
Data Synchronization
Encryption
File Sharing
Version Control

Container Management

Access Control
Application Development
Automatic Scaling
Build Automation
Container Health Management
Container Storage
Deployment Automation
File Isolation
Hybrid Deployments
Network Isolation
Orchestration
Shared File Systems
Version Control
Virtualization

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Database

Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization

Infrastructure-as-a-Service (IaaS)

Analytics / Reporting
Configuration Management
Data Migration
Data Security
Load Balancing
Log Access
Network Monitoring
Performance Monitoring
SLA Monitoring

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Virtual Machine

Backup Management
Graphical User Interface
Remote Control
VDI
Virtual Machine Encryption
Virtual Machine Migration
Virtual Machine Monitoring
Virtual Server

Web Hosting

Cloud Hosting
DDOS Protection
Dedicated Hosting
Email Hosting
Managed Hosting
Multiple Datacenter Locations
Private SSL
SSD Storage
Server Backups
Shared Website Hosting
Unlimited Bandwidth Option
VPS
Website Builder

Popular Alternatives

Popular Alternatives