Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
We provide data center services that emphasize security, adaptability, and accessibility, offering comprehensive and customizable accommodation solutions across our three facilities located in Barcelona and Madrid. By positioning your essential infrastructure within our secure environment, you can establish a robust and scalable cloud infrastructure that meets your current and future business requirements. Our IaaS offerings simplify this process, allowing for seamless integration. Moreover, we deliver neutral and secure connectivity solutions characterized by exceptional quality, strength, and adaptability, facilitated by our partnerships with leading network operators in the nation. With over thirty years of experience and a steadfast commitment to ongoing team development, we ensure the reliability of your infrastructure. Our facilities are equipped with advanced protections against fires and intrusion, thereby maximizing service availability and business continuity. Additionally, our dedicated and knowledgeable staff stand ready to support your needs, acting as your eyes and hands within our data centers, ensuring that you receive the highest level of service and security.
Description
Comprehensive protection, oversight, and micro-segmentation of workloads are essential for private cloud and on-premises data center settings. This includes fortifying security and providing monitoring capabilities specifically designed for private cloud infrastructures and physical data centers, along with support for Docker containerization. Utilizing agentless protection for Docker containers allows for extensive application control paired with streamlined management. To defend against zero-day vulnerabilities, implementing application whitelisting, detailed intrusion prevention measures, and real-time file integrity monitoring (RT-FIM) is crucial. Additionally, ensuring the security of OpenStack deployments requires thorough hardening of the Keystone identity service module. Continuous monitoring of data center security is vital for maintaining safe operations in private clouds and physical environments. Moreover, enhancing security performance in VMware setups can be achieved through agentless antimalware solutions, alongside network intrusion prevention and file reputation services, which collectively contribute to a robust security posture. Ultimately, effective security measures are indispensable for safeguarding sensitive data within these infrastructures.
API Access
Has API
API Access
Has API
Integrations
Auditor for z/OS
EnCase Forensic
FortiSandbox
HP-UX
HPE OpenVMS
NorthStar Navigator
OctoXLabs
Integrations
Auditor for z/OS
EnCase Forensic
FortiSandbox
HP-UX
HPE OpenVMS
NorthStar Navigator
OctoXLabs
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Adam
Country
Spain
Website
adam.es/
Vendor Details
Company Name
Broadcom
Founded
1991
Country
United States
Website
www.broadcom.com/products/cybersecurity/endpoint/hybrid-cloud/data-center-security
Product Features
Data Center Management
Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance
Infrastructure-as-a-Service (IaaS)
Analytics / Reporting
Configuration Management
Data Migration
Data Security
Load Balancing
Log Access
Network Monitoring
Performance Monitoring
SLA Monitoring
Product Features
Container Security
Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata
Data Center Management
Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance