Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Fortress provides a secure and fully-isolated environment designed for optimal availability, utilizing "shadow" VMs to ensure that your industrial applications maintain exceptional resilience. The Integrity Environment is equipped with a powerful, agent-less snapshotting feature that dynamically captures the unique configurations of client control systems, along with integrated malware scanning and robust encryption/decryption functionalities to uphold the integrity and confidentiality of backups. Within this setup, specialized tools are employed to operate secondary copies of industrial control applications in purpose-built, fortified virtual machines that are supplied with configuration data from the integrity environment. Furthermore, all elements of the Fortress platform are maintained on a dedicated infrastructure that is both logically and physically segregated from the client’s main network, thereby protecting against potential security breaches. Unlike conventional high-availability systems, which are susceptible to lateral attacks from malicious entities, Fortress enhances security through its innovative design. This layered approach not only fortifies the environment against threats but also ensures a seamless operational continuity for critical industrial processes.
Description
To accommodate the dynamic requirements of your business, you can swiftly add or remove CVMs within minutes. By establishing appropriate policies, you can guarantee that your CVM instances automatically scale up during peak demand periods to maintain application availability and scale down during low-demand periods to optimize costs. The CVM platform provides a diverse array of instances, operating systems, and software packages tailored to your needs. Each instance's CPU, memory, disk, and bandwidth configurations can be adjusted flexibly to align with your application's specifications. Additionally, CVM is compatible with multiple versions of Linux distributions as well as Windows Server editions. As an administrator, you have complete control over your Tencent Cloud CVMs, allowing for comprehensive management capabilities. You can utilize various tools, including the Tencent Cloud console and APIs, to connect to your CVM instances and carry out operations such as rebooting and altering network settings. This flexibility ensures that your infrastructure can adapt to changing demands effectively and efficiently.
API Access
Has API
API Access
Has API
Integrations
Tencent Cloud
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Fortress Labs
Country
United States
Website
www.fortresslabs.com/platform
Vendor Details
Company Name
Tencent
Founded
2013
Country
China
Website
intl.cloud.tencent.com/product/cvm
Product Features
Virtual Machine
Backup Management
Graphical User Interface
Remote Control
VDI
Virtual Machine Encryption
Virtual Machine Migration
Virtual Machine Monitoring
Virtual Server
Product Features
Virtual Machine
Backup Management
Graphical User Interface
Remote Control
VDI
Virtual Machine Encryption
Virtual Machine Migration
Virtual Machine Monitoring
Virtual Server