Company Website
Company Website

Ratings and Reviews 6 Ratings

Ratings and Reviews 6 Ratings

Total
ease
features
design
support

Media

Media

Integrations Supported

Amazon Web Services (AWS)
Ansible
Arista EOS
Chef
ExtremeCloud IQ
Grafana
IBM Cloud Veeam
Microsoft 365
NVIDIA DRIVE
Pandora FMS
Plesk
Pulumi
Terraform
VMware Cloud
Zabbix
Zerto
cPanel

Integrations Supported

Amazon Web Services (AWS)
Ansible
Arista EOS
Chef
ExtremeCloud IQ
Grafana
IBM Cloud Veeam
Microsoft 365
NVIDIA DRIVE
Pandora FMS
Plesk
Pulumi
Terraform
VMware Cloud
Zabbix
Zerto
cPanel

API Availability

Has API

API Availability

Has API

Pricing Information

$0.10/hour
Free Trial Offered?
Free Version

Pricing Information

$1736/year/appliance
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

phoenixNAP

Date Founded

2009

Company Location

United States

Company Website

phoenixnap.com

Company Facts

Organization Name

SKUDONET

Date Founded

2012

Company Location

Spain

Company Website

www.skudonet.com

Categories and Features

Backup

Backup Log
Backup Scheduling
Cloud Backup
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Remote Server Options
Secure Data Storage
Web Access / Restoration

Business Continuity

Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Web Access / Restoration

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cloud Storage

Access Control
Archiving & Retention
Backup
Data Migration
Data Synchronization
Encryption
File Sharing
Version Control

Data Center Backup

Continuous Data Protection
Deduplication
Encryption
File Archival
File Compression
Platform Agnostic
Regular Snapshots
Reporting / Analytics

Data Center Management

Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Dedicated Server Hosting

24/7 On-site Support
Built-in Backup Drives
DDOS Protection
IMPI Access
Off Server Backups
Root Level
SSD Storage
Uptime SLA

Disaster Recovery

Administration Policies
Bare-Metal Recovery
Encryption
Failover Testing
Flexible Data Capture
Multi-Platform Support
Multiple Data Type Support
Offline Storage

Infrastructure-as-a-Service (IaaS)

Analytics / Reporting
Configuration Management
Data Migration
Data Security
Load Balancing
Log Access
Network Monitoring
Performance Monitoring
SLA Monitoring

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Categories and Features

Application Delivery Controllers (ADC)

CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)

Application Performance Monitoring (APM)

Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Popular Alternatives

Popular Alternatives

NetScaler Reviews & Ratings

NetScaler

Cloud Software Group
VSYS Reviews & Ratings

VSYS

VSYS Host
A10 Thunder ADC Reviews & Ratings

A10 Thunder ADC

A10 Networks