Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Persistent Disk provides dependable and high-efficiency block storage tailored for virtual machine instances. For scenarios where bulk throughput takes precedence, HDD serves as a cost-effective storage solution. Conversely, SSD ensures consistently superior performance for both random-access tasks and bulk throughput demands. Each of these storage types can be expanded up to a capacity of 64 TB. Thanks to multi-reader mounting capabilities, numerous virtual machines can simultaneously access data from a single Persistent Disk without experiencing a drop in aggregate performance or incurring additional costs. You no longer need to fret about the potential downsizing of your block devices; Persistent Disk offers unparalleled flexibility by enabling you to adjust your storage size even while in operation across one or more virtual machines, all without any downtime. For enhanced convenience and adaptability, snapshots are automatically geo-replicated and readily available for restoration across all regions. Additionally, the process for creating snapshots of a block device can be completed in just minutes instead of lasting hours. To ensure data security, Persistent Disks are automatically encrypted, safeguarding your information both during transmission and while stored. With these features combined, Persistent Disk stands out as a robust solution for managing storage needs effectively.

Description

StealthDisk Mobile leverages Virtual Disk Technology to securely and effortlessly manage your essential files and documents. By employing top-tier encryption algorithms, it generates an encrypted virtual disk that seamlessly encrypts and decrypts your data as you work. Once you finish your tasks, simply dismount the StealthDisk volume, and all your significant files and documents become instantly concealed and encrypted. Unlike other file encryption tools that require you to encrypt each file or folder individually, StealthDisk Mobile simplifies the process. Its algorithms are not only optimized for efficiency but also operate at remarkable speeds. The software handles data on-the-fly, ensuring that decryption occurs only when data is accessed, rather than requiring the entire file to be processed upfront. This means you can work more efficiently, as StealthDisk Mobile automates encryption and decryption for the specific data you engage with, ultimately conserving both time and system resources. With StealthDisk Mobile, you can enjoy peace of mind knowing your files are protected without the hassle of manual encryption steps.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

No details available.

Integrations

No details available.

Pricing Details

$0.040 per GB
Free Trial
Free Version

Pricing Details

$49.95 one-time payment
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Google

Founded

1998

Country

United States

Website

cloud.google.com/persistent-disk/

Vendor Details

Company Name

Security Group Six

Website

www.sgsix.com

Product Features

Product Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

Alternatives

DriveCrypt Reviews

DriveCrypt

Securstar
SecureZIP Reviews

SecureZIP

PKWARE
Passware Kit Reviews

Passware Kit

Passware