Learn More
Learn More

Average Ratings 6 Ratings

Total
ease
features
design
support

Average Ratings 6 Ratings

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Ansible
Arista EOS
Chef
ExtremeCloud IQ
Grafana
IBM Cloud Veeam
Microsoft 365
NVIDIA DRIVE
Pandora FMS
Plesk
Pulumi
Terraform
VMware Cloud
Zabbix
Zerto
cPanel

Integrations

Amazon Web Services (AWS)
Ansible
Arista EOS
Chef
ExtremeCloud IQ
Grafana
IBM Cloud Veeam
Microsoft 365
NVIDIA DRIVE
Pandora FMS
Plesk
Pulumi
Terraform
VMware Cloud
Zabbix
Zerto
cPanel

Pricing Details

$1736/year/appliance
Free Trial
Free Version

Pricing Details

$0.10/hour
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

SKUDONET

Founded

2012

Country

Spain

Website

www.skudonet.com

Vendor Details

Company Name

phoenixNAP

Founded

2009

Country

United States

Website

phoenixnap.com

Product Features

Application Delivery Controllers (ADC)

CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)

Application Performance Monitoring (APM)

Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Product Features

Backup

Backup Log
Backup Scheduling
Cloud Backup
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Remote Server Options
Secure Data Storage
Web Access / Restoration

Business Continuity

Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Web Access / Restoration

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cloud Storage

Access Control
Archiving & Retention
Backup
Data Migration
Data Synchronization
Encryption
File Sharing
Version Control

Data Center Backup

Continuous Data Protection
Deduplication
Encryption
File Archival
File Compression
Platform Agnostic
Regular Snapshots
Reporting / Analytics

Data Center Management

Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Dedicated Server Hosting

24/7 On-site Support
Built-in Backup Drives
DDOS Protection
IMPI Access
Off Server Backups
Root Level
SSD Storage
Uptime SLA

Disaster Recovery

Administration Policies
Bare-Metal Recovery
Encryption
Failover Testing
Flexible Data Capture
Multi-Platform Support
Multiple Data Type Support
Offline Storage

Infrastructure-as-a-Service (IaaS)

Analytics / Reporting
Configuration Management
Data Migration
Data Security
Load Balancing
Log Access
Network Monitoring
Performance Monitoring
SLA Monitoring

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Alternatives

Alternatives

VSYS Reviews

VSYS

VSYS Host
NetScaler Reviews

NetScaler

Cloud Software Group
A10 Thunder ADC Reviews

A10 Thunder ADC

A10 Networks