Company Website

Ratings and Reviews 6 Ratings

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

What is phoenixNAP?

PhoenixNAP, a prominent global provider of Infrastructure as a Service (IaaS), assists organizations across various scales in fulfilling their IT demands for performance, security, and scalability. With services accessible from key edge locations across the U.S., Europe, Asia-Pacific, and Latin America, phoenixNAP ensures that businesses can effectively expand into their desired regions. Their offerings include colocation, Hardware as a Service (HaaS), private and hybrid cloud solutions, backup services, disaster recovery, and security, all presented on an operating expense-friendly basis that enhances flexibility and minimizes costs. Built on cutting-edge technologies, their solutions offer robust redundancy, enhanced security, and superior connectivity. Organizations from diverse sectors and sizes can tap into phoenixNAP's infrastructure to adapt to their changing IT needs at any point in their growth journey, ensuring they remain competitive in the ever-evolving digital landscape. Additionally, the company’s commitment to innovation ensures that clients benefit from the latest advancements in technology.

What is IBM Cloud Secure Virtualization?

Enhance the security of your workloads, simplify compliance with regulations, and uphold data sovereignty through IBM Cloud Secure Virtualization. A dependable cloud infrastructure must tackle essential issues surrounding corporate governance, security, and compliance. Businesses are eager to create an environment where management, workload efficiency, and data accessibility are confined to designated geographic areas, all while ensuring thorough auditing capabilities are in place. During the initial configuration, it is crucial to identify the firmware settings that are permissible alongside the approved hypervisor settings. It is also important to meticulously document each physical host along with its corresponding location, producing a snapshot or fingerprint of the launch configuration for every trusted host. This collection of information is organized into an allowlist. When the BIOS and hypervisor measurements of a host correspond with those documented in the allowlist, the boot environment is validated. As a result, the host is launched in a secure and trusted state, preserving the integrity of the cloud environment throughout its lifecycle. By adhering to these established procedures, organizations can confidently oversee their cloud resources while satisfying rigorous security requirements, ultimately fostering a more resilient and compliant operational framework.

Media

Media

Integrations Supported

Amazon Web Services (AWS)
Ansible
Arista EOS
Chef
ExtremeCloud IQ
HyTrust
IBM Cloud
Microsoft 365
NVIDIA DRIVE
Plesk
Pulumi
Terraform
VMware Cloud
Zerto
cPanel

Integrations Supported

Amazon Web Services (AWS)
Ansible
Arista EOS
Chef
ExtremeCloud IQ
HyTrust
IBM Cloud
Microsoft 365
NVIDIA DRIVE
Plesk
Pulumi
Terraform
VMware Cloud
Zerto
cPanel

API Availability

Has API

API Availability

Has API

Pricing Information

$0.10/hour
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

phoenixNAP

Date Founded

2009

Company Location

United States

Company Website

phoenixnap.com

Company Facts

Organization Name

IBM

Date Founded

1911

Company Location

United States

Company Website

www.ibm.com/cloud/architecture/architectures/virtualization_security_hytrust/

Categories and Features

Backup

Backup Log
Backup Scheduling
Cloud Backup
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Remote Server Options
Secure Data Storage
Web Access / Restoration

Business Continuity

Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Web Access / Restoration

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cloud Storage

Access Control
Archiving & Retention
Backup
Data Migration
Data Synchronization
Encryption
File Sharing
Version Control

Data Center Backup

Continuous Data Protection
Deduplication
Encryption
File Archival
File Compression
Platform Agnostic
Regular Snapshots
Reporting / Analytics

Data Center Management

Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Dedicated Server Hosting

24/7 On-site Support
Built-in Backup Drives
DDOS Protection
IMPI Access
Off Server Backups
Root Level
SSD Storage
Uptime SLA

Disaster Recovery

Administration Policies
Bare-Metal Recovery
Encryption
Failover Testing
Flexible Data Capture
Multi-Platform Support
Multiple Data Type Support
Offline Storage

Infrastructure-as-a-Service (IaaS)

Analytics / Reporting
Configuration Management
Data Migration
Data Security
Load Balancing
Log Access
Network Monitoring
Performance Monitoring
SLA Monitoring

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Categories and Features

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Popular Alternatives

Popular Alternatives

VSYS Reviews & Ratings

VSYS

VSYS Host
Fairwinds Insights Reviews & Ratings

Fairwinds Insights

Fairwinds Ops