Productivity & Efficiency

Security and Identity

Home // Solutions // CloudPane® // Productivity and Efficiency // Security and Identity

Access Control

ITIQ enables you to securely control access to ITIQ services and resources for your users. Using IAM, you can create and manage ITIQ users and groups, and use permissions to allow and deny their access to ITIQ resources.

Manage users and their access – You can create users in ITIQ, assign them individual security credentials (in other words, access keys, passwords, and multi-factor authentication devices), or request temporary security credentials to provide users access to ITIQ services and resources. You can manage permissions in order to control which operations a user can perform.

Manage roles and their permissions – You can create roles in IAM and manage permissions to control which operations can be performed by the entity, or ITIQ service, that assumes the role. You can also define which entity is allowed to assume the role.

Manage federated users and their permissions – You can enable identity federation to allow existing identities (users, groups, and roles) in your enterprise to access the ITIQ Management Console, call ITIQ APIs, and access resources, without the need to create a user for each identity.

SSL/TLS Certificates

ITIQ Certificate Manager is a service that lets you easily provision, manage, and deploy Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with ITIQ services. SSL/TLS certificates are used to secure network communications and establish the identity of websites over the Internet. ITIQ Certificate Manager removes the time-consuming manual process of purchasing, uploading, and renewing SSL/TLS certificates.

Key Storage & Management

The ITIQ service helps you meet corporate, contractual and regulatory compliance requirements for data security by using dedicated Hardware Security Module (HSM) appliances within the ITIQ cloud. With ITIQ, you control the encryption keys and cryptographic operations performed by the HSM.

The ITIQ service works with ITIQ Virtual Private Cloud (VPC). CloudHSM instances are provisioned inside your VPC with an IP address that you specify, providing simple and private network connectivity to your ITIQ Elastic Compute Cloud instances.

Identity Management

ITIQ Directory Service makes it easy to setup and run Microsoft Active Directory (AD) in the ITIQ cloud, or connect your ITIQ resources with an existing on-premises Microsoft Active Directory. Once your directory is created, you can use it to manage users and groups, provide single sign-on to applications and services, create and apply group policy, domain join instances, as well as simplify the deployment and management of cloud-based Linux and Microsoft Windows workloads.

ITIQ Directory Service provides you with three directory types to choose from including ITIQ Directory Service for Microsoft Active Directory (Enterprise Edition), also referred to as Microsoft AD, as well as Simple AD, and AD Connector.

Security Management

ITIQ has an automated security assessment service that helps improve the security and compliance of applications deployed on ITIQ. ITIQ automatically assesses applications for vulnerabilities or deviations from best practices. After performing an assessment, ITIQ produces a detailed report with prioritized steps for remediation.

To help you get started quickly, ITIQ includes a knowledge base of hundreds of rules mapped to common security compliance standards (e.g. PCI DSS) and vulnerability definitions. Examples of built-in rules include checking for remote root login being enabled, or vulnerable software versions installed. These rules are regularly updated by ITIQ security researchers.

Web Application Firewall

ITIQ WAF is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources. ITIQ WAF gives you control over which traffic to allow or block to your web applications by defining customizable web security rules. You can use ITIQ WAF to create custom rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules that are designed for your specific application. New rules can be deployed within minutes, letting you respond quickly to changing traffic patterns. Also, ITIQ WAF includes a full-featured API that you can use to automate the creation, deployment, and maintenance of web security rules.

With ITIQ WAF you pay only for what you use. ITIQ WAF pricing is based on how many rules you deploy and how many web requests your web application receives. There are no upfront commitments.

Get Started Now

Sign Up Now

Set your business up with our one-of-a-kind system and see exactly how powerful it is.

Sign Up Now

Contact Our Sales Team

Speak to a sales representative about setting your business up with our revolutionary system.

Contact Us

Discuss Your Needs

Discuss your business needs with a professional consultant who can recommend the best integration.

Get a Quote