Average Ratings 0 Ratings
Average Ratings 1 Rating
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
$10
Free Trial
Free Version
Pricing Details
$39/month/gateway
Free Trial
Free Version
Deployment
SaaS
iPhone
iPad
Android
Windows
Mac
Linux
Deployment
SaaS
iPhone
iPad
Android
Windows
Mac
Linux
Support
Phone Support
24/7 Live Support
Online
Support
Phone Support
24/7 Live Support
Online
Training
Documentation
Webinars
Live Online
In Person
Training
Documentation
Webinars
Live Online
In Person
Vendor Details
Company Name
Delska
Founded
1999
Country
Latvia
Website
delska.com
Vendor Details
Company Name
enforza
Founded
2023
Country
United Kingdom
Website
enforza.io
Product Features
Cloud Management
Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval
DDoS Protection
DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)
Dedicated Server Hosting
24/7 On-site Support
Built-in Backup Drives
DDOS Protection
IMPI Access
Off Server Backups
Root Level
SSD Storage
Uptime SLA
Disaster Recovery
Administration Policies
Bare-Metal Recovery
Encryption
Failover Testing
Flexible Data Capture
Multi-Platform Support
Multiple Data Type Support
Offline Storage
Network Security
Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Virtual Machine
Backup Management
Graphical User Interface
Remote Control
VDI
Virtual Machine Encryption
Virtual Machine Migration
Virtual Machine Monitoring
Virtual Server
Product Features
Cloud Management
Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Firewall
Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification
Infrastructure-as-a-Service (IaaS)
Analytics / Reporting
Configuration Management
Data Migration
Data Security
Load Balancing
Log Access
Network Monitoring
Performance Monitoring
SLA Monitoring
Network Security
Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning