Average Ratings 1 Rating
Average Ratings 0 Ratings
Description
Akamai Cloud (previously known as Linode) provides a next-generation distributed cloud platform built for performance, portability, and scalability. It allows developers to deploy and manage cloud-native applications globally through a robust suite of services including Essential Compute, Managed Databases, Kubernetes Engine, and Object Storage. Designed to lower cloud spend, Akamai offers flat pricing, predictable billing, and reduced egress costs without compromising on power or flexibility. Businesses can access GPU-accelerated instances to drive AI, ML, and media workloads with unmatched efficiency. Its edge-first infrastructure ensures ultra-low latency, enabling applications to deliver exceptional user experiences across continents. Akamai Cloud’s architecture emphasizes portability—helping organizations avoid vendor lock-in by supporting open technologies and multi-cloud interoperability. Comprehensive support and developer-focused tools simplify migration, application optimization, and scaling. Whether for startups or enterprises, Akamai Cloud delivers global reach and superior performance for modern workloads.
Description
Red Hat® Ceph Storage is a flexible and highly scalable storage solution designed for contemporary data workflows. Specifically developed to support data analytics, artificial intelligence/machine learning (AI/ML), and other emerging applications, it offers software-defined storage compatible with a variety of standard hardware options. You can scale your storage to extraordinary levels, accommodating up to 1 billion objects or more without sacrificing performance quality. The system allows you to adjust storage clusters up or down seamlessly, ensuring there is no downtime during the process. This level of adaptability provides the agility necessary to accelerate your time to market. Installation is notably simplified, enabling quicker setup and deployment. Additionally, the platform facilitates rapid insights from vast quantities of unstructured data through enhanced operation, monitoring, and capacity management tools. To protect your data from external threats and hardware malfunctions, it comes equipped with comprehensive data protection and security features, including encryption at both the client-side and object levels. Managing backup and recovery processes is straightforward, thanks to a centralized point of control and administration, allowing for efficient data management and enhanced operational efficiency. This makes Red Hat Ceph Storage an ideal choice for organizations looking to leverage scalable and reliable storage solutions.
API Access
Has API
API Access
Has API
Integrations
CloudCasa
Netdata
Akitra Andromeda
BluVault
Drupal
Genatron
InfluxDB
MasterDC
Migrateq
Netmaker
Integrations
CloudCasa
Netdata
Akitra Andromeda
BluVault
Drupal
Genatron
InfluxDB
MasterDC
Migrateq
Netmaker
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Akamai
Founded
1998
Country
United States
Website
www.akamai.com/cloud
Vendor Details
Company Name
Red Hat
Founded
1993
Country
United States
Website
www.redhat.com/en/technologies/storage/ceph
Product Features
Backup
Backup Log
Backup Scheduling
Cloud Backup
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Remote Server Options
Secure Data Storage
Web Access / Restoration
Cloud Storage
Access Control
Archiving & Retention
Backup
Data Migration
Data Synchronization
Encryption
File Sharing
Version Control
DDoS Protection
DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)
Firewall
Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification
Infrastructure-as-a-Service (IaaS)
Analytics / Reporting
Configuration Management
Data Migration
Data Security
Load Balancing
Log Access
Network Monitoring
Performance Monitoring
SLA Monitoring
Load Balancing
Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers
Managed DNS
Anti-Malware
Change Management
DDoS Protection
DNS Failover
DNS Propagation
Disaster Recovery
Global DNS Network
Intelligent Traffic Routing
Load Balancing
Reporting / Analytics
Secondary DNS
Web Application Firewall (WAF)
Virtual Machine
Backup Management
Graphical User Interface
Remote Control
VDI
Virtual Machine Encryption
Virtual Machine Migration
Virtual Machine Monitoring
Virtual Server
VPS Hosting
Access Control / Permissions
FTP
Managed VPS
Multi-Server Management
One-Click Apps
Root Access
SSD Storage
Unmanaged VPS
Upload Custom ISO