Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Protecting the identity, integrity, and confidentiality of our clients is our top priority. However, we also recognize the importance of offering references to you, our prospective BCM partner, so we encourage you to request a demo, and we'll connect you with up to five current clients who can share their experiences with C2 and how our BCM Software has bolstered their business resilience. The C2 business continuity software is designed to be user-friendly, making it straightforward to implement while providing an effective framework that supports our business continuity processes. This platform not only excels in usability but is also scalable, adaptable, and comprehensive, ensuring that it aligns with and complies with ISO standards. From a governance standpoint, its deployment as an overarching BCMS is exceptional; nonetheless, this only scratches the surface of its capabilities. The tool's operational implementation is highly effective, proving invaluable for real-time scenarios, which significantly enhances its utility. Having utilized this software in two distinct companies across various sectors, I've witnessed substantial advantages in both environments, demonstrating its versatility and effectiveness. It is truly a transformative resource for enhancing operational resilience and efficiency.
Description
ModusCloud by Vircom is a cloud-based email security product that provides real-time threat protection, phishing detection, advanced multilayer antivirus and email archiving. Users are protected against malicious and unwanted email. Administrators can easily customize service to meet users' requirements and policies. ModusCloud offers clients access to enterprise security technology and infrastructure used by some the most secure companies in the world. This is combined with our expert knowledge and understanding of smaller businesses' needs. We offer a hosted email security solution that includes email threat protection, email continuity with Emergency Inbox and policy-enforced encryption. All of this is easily managed via a user interface.
API Access
Has API
API Access
Has API
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Continuity2
Country
United Kingdom
Website
continuity2.com/clients
Vendor Details
Company Name
Vircom
Founded
1994
Country
Canada
Website
www.vircom.com
Product Features
Business Continuity
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Web Access / Restoration
Data Recovery
Web Access / Restoration
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Product Features
Anti-Spam
Allow / Block List
Audit Log
Email Archiving
Email Recovery
Email Routing
Encryption
Fraud Detection
Quarantine
Reporting & Statistics
Spam Filter
Business Continuity
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Web Access / Restoration
Data Recovery
Web Access / Restoration
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Email Archiving
Access Control
Backup Management
Compliance Management
Data Deduplication
Data Export
Encryption
Retention Management
Storage Management
Threat Protection
eDiscovery
Email Security
Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning