
Enterprise Cybersecurity Architecture
We support companies in the process of analyzing their security posture, designing the cybersecurity architecture adjusted to the company's reality and defining policies.
USD $182,83 – USD $493,62
Price per Socket – Requires the ArcServe UDP 8.0 Advanced license for its operation
Minimum 1 license, maximum 100. To purchase a larger quantity, select the required quantity and request your quote from the shopping cart.
Unified Data Protection (UDP) is a solution that provides companies with advanced protection and data restoration and disaster recovery in an efficient way with minimal impact on the operation.
This solution also allows the unification of technologies, in order to create an infrastructure with centralized administration of different applications and local, virtual and SaaS-based systems.
Protects platforms including: Windows, Linux, Amazon EC2, Microsoft Azure, Office 365 (Exchange Online, Teams, SharePoint Online and OneDrive for Business), Microsoft Exchange, MS SQL, file servers, Microsoft IIS, Microsoft Active Directory, Oracle Database with native support for RMAN, VMware vSphere (agentless), and Microsoft Hyper-V (agentless)
https://www.arcserve.com/la/data-protection-solutions/arcserve-udp/
validity | 12 months, 36 months |
---|
Minimum 1 license, maximum 100. To purchase a larger quantity, select the required quantity and request your quote from the shopping cart.
Arcserve UDP uniquely combines deep learning endpoint protection, immutable storage, and scalable business continuity both on and off-site with a multi-layered approach that delivers total IT resiliency to your virtual, physical, and virtual infrastructures. and of cloud.
We support companies in the process of analyzing their security posture, designing the cybersecurity architecture adjusted to the company's reality and defining policies.
Make visible and control your SaaS platforms and protect your emails and files on different platforms.
We analyze your network infrastructure in search of vulnerabilities that could be exploited by computer attackers