Learn More

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 14 Ratings

Description

The Comodo Security Operations Center (CSOC) offers around-the-clock security oversight provided by certified analysts utilizing cutting-edge technology. The professionals at CSOC are responsible for identifying and evaluating threats, issuing alerts when necessary to engage clients in resolving issues and aiding in mitigation efforts. By leveraging Comodo cWatch CSOC, your internal IT department can enhance its ability to safeguard applications through advanced security solutions that are simple to deploy, fully managed, and do not necessitate significant initial investments. This service is engineered to streamline the intricate and time-intensive process of investigating security incidents while alleviating the financial burden associated with maintaining in-house security personnel. With real-time monitoring of web traffic and proactive threat identification, our security specialists can promptly inform organizations and take appropriate measures when an attack is detected. Continuous surveillance by the Comodo CSOC team, who possess extensive expertise in application security monitoring and management, ensures that organizations can operate with greater peace of mind. This comprehensive approach not only protects your assets but also allows your team to focus on core business functions without the distraction of security concerns.

Description

Delska is a data center and network operator that provides tailor-made IT and network services for businesses. With 5 data centers (one under construction, launching in 2025) in Latvia and Lithuania, and points of presence in Germany, Netherlands, and Sweden, we offer a comprehensive regional data center and network ecosystem. By 2030, we aim to achieve net-zero CO2 emissions, setting standard for sustainable IT infrastructure in the Baltic region. In addition to cloud computing, colocation, data security, network, and other services, we have launched the self-service cloud platform myDelska for swift virtual machine deployment, IT resources management, and soon-to-come bare metal services. Key features: • Unlimited traffic and predictable monthly costs • API integration • Flexible firewall configurations • Backup solutions • Real-time network topology • Latency measurement map • Alpine Linux, Ubuntu, Debian, Windows OS, openSUSE and other operating systems Since June 2024, Delska has merged 2 companies—DEAC European Data Center and Data Logistics Center (DLC). Both operate under their respective legal entities, which are owned by Quaero European Infrastructure Fund II.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

No details available.

Integrations

No details available.

Pricing Details

$9.90
Free Trial
Free Version

Pricing Details

€10
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Comodo Group

Founded

1999

Country

United States

Website

www.comodo.com/website-security-platform/cwatch.php

Vendor Details

Company Name

Delska

Founded

1999

Country

Latvia

Website

delska.com

Product Features

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Web Content Filtering

Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting

Product Features

Cloud Management

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Dedicated Server Hosting

24/7 On-site Support
Built-in Backup Drives
DDOS Protection
IMPI Access
Off Server Backups
Root Level
SSD Storage
Uptime SLA

Disaster Recovery

Administration Policies
Bare-Metal Recovery
Encryption
Failover Testing
Flexible Data Capture
Multi-Platform Support
Multiple Data Type Support
Offline Storage

Infrastructure-as-a-Service (IaaS)

Analytics / Reporting
Configuration Management
Data Migration
Data Security
Load Balancing
Log Access
Network Monitoring
Performance Monitoring
SLA Monitoring

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Virtual Machine

Backup Management
Graphical User Interface
Remote Control
VDI
Virtual Machine Encryption
Virtual Machine Migration
Virtual Machine Monitoring
Virtual Server

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Web Hosting

Cloud Hosting
DDOS Protection
Dedicated Hosting
Email Hosting
Managed Hosting
Multiple Datacenter Locations
Private SSL
SSD Storage
Server Backups
Shared Website Hosting
Unlimited Bandwidth Option
VPS
Website Builder

Alternatives

Alternatives

Sungard AS Reviews

Sungard AS

Sungard Availability Services
China Telecom Reviews

China Telecom

China Telecom Americas