Explore Our Great Features
Carrier Class Edge Firewalls
Perimeter protection tha delivers uptime performance equal to leading carrier or enterprise technology solutions at 99.9% uptime. Routes up to 2 million packets per second using hardware line rates supporting up to 1 Gbps Internet connections.
Specified rules to permit directing specific network and Internet traffic and apply these rules in the order specified. Firewall policies allow us to block or allow certain types of network traffic not specified in a policy exception. A policy also defines which firewall features get enabled or disabled.
Multiple Firewall Layers
A well protected network requires more than one firewall. Properly configured firewalls and routers placed in different locations on the network provide added layers of protection. A multi-faceted security strategy helps to protect all assets.
Network Address Translation
Changes packet addressing based on customized source and destination NAT rules to provide hidden internal defined objects to communicate with public Internet connections without direct exposure.
Mail Security Platform
The email security solution helps to protect your mail server against all email threats the moment they emerge. Controls all incoming and outgoing email to protect users from spam, viruses, phishing and trojans. The platform integrates an anti virus engine, various filtering methods, clustering and more to detect malware and other malicious threats.
Autolearning SPAM Algorithm
Combining multiple filtering methods such as sender policy framework, dns-based balckhole lists, SMTP whitelists, Bayesian filters, real-time block lists, and an autolearning algorithm that gets smarter over time to keep your email inbox clutter free.
Real-Time System Monitoring
Wingu collects and analyzes thousands of metrics per server to quickly identify performance and potential issues using stunning real-time interactive web dashboards to display the status of each server. Real-time system monitoring is a method of observing and analyzing different types of data as it is being accessed, manipulated, and viewed.
Software Patch Management
Keeping up with software updates and patches is a tedious and time consuming task for security pros, but a necessary effort to keep software applications at peak performance and best secured. Security experts estimate that 90% of successful attacks against software vulnerabilities could be prevented with an existing patch or configuration setting.
Firmware Patch Management
Equally important as maintaining updates for software applications, firmware is software designed to manage hardware. Poorly patched and out-dated firmware can lead to breaches that infiltrate the network at the hardware level, such as routers, firewalls, servers, switches, printers and desktops.
Virtual Private Networks
A virtual private network (VPN) provides a secure, encrypted tunnel to transmit data between a remote user via the Internet and the company network. A virtual private network extends a private network across the Internet and enables users to send and receive data as if their devices were directly connected to the private network.
Secure Socket Layers
Data Loss Prevention
Web Traffic Servers
Secure Web Proxy
Security Hardened Servers
Encrypted Storage Volumes
Rootkit, Backdoor & Exploits
Intrusion Protection Services
Advanced Intrusion Detection
Host Intrusion Prevention
Sophisticated Systems Auditing
Remediation and Mitigation
Secure Remote Access
SOX & HIPAA Compliance
Cyber Insurance Ready
Private Cloud Servers
A cloud server is a logical server that is built, hosted and delivered through a cloud computing platform over the Internet. Your cloud servers live in your office.
Intel CPU Processors
High-performance central processing units for data processing and mathematical calculations to deliver accurate information.
Error Correcting Memory
A memory type that adds error detection and correction to the data in the RAM chip. ECC memory can identify and fix the most common memory data errors.
Enterprise Class Hard Disks
Highly specialized internal hard drives that deliver trusted performance and rock-solid reliability for demanding 24x7 operations.
Redundant Power Supplies
Two or more power supply units that are capable of powering the entire computer. If one fails, the other power supply will keep the computer powered up.
Secure Equipment Racks
Fully enclosed, secure server cabinets that exceed air flow requirements. Locked and keyed racks keeps all computer equipment safe from molestation.
Hardware Refresh Program
The hardware refresh program allows existing Secure Cloud-In-A-Box customers with an active lease to migrate to the latest hardware platforms at a reduced price ensuring customers benefit from the latest hardware improvements and firmware capabilities.
All Flash Storage Options
Wingu Technology provides enterprise, all-flash data storage solutions that deliver data-centric architecture to accelerate your business for a competitive advantage. An all flash storage device is configured with high performance SSD or NVMe drives.
With the combination of error correcting memory, enterprise class hard drives, and self-healing filesystems, our systems deliver a high degree of customer data containing no mistakes thus providing a high degree of compute confidence.
Self Healing File System
Hardware is imperfect... disks fail, servers crash, which leads to inconsistencies in the file-system metadata. When a bad data block is detected, our filesystem fetches the correct data from another redundant copy, but it also repairs the bad data by replacing it with the good copy.
Full virtualization is a common and cost-effective method for reducing hardware, cooling, and support costs for providing advanced level computing. Vitualization allows Wingu Technology to design highly functional and safe data environments that brings your compute posture up to "high-class" to even the playing field.
High Performance Compute
High performance computer is often related to "super computers" reserved for high-end data crunching such as space, financial and medical applications. We are working on that for you but for now, we have really powerful virtualized compute environments that rival the computer systems of your larger competitors. You can now compete.
Up To Ten Backup Tiers
Who hasn't experienced the inability to recover data after a failure or a big screw-up. Having a condition called "backup phobia", multiple layers of backup and recovery are incorporated in every Secure Cloud-In-A-Box system. Up to 6 (six) layers are included with options to increase to many more.
Self Air-Cooling Racks
The equipment rack houses the servers and networking components. To extend the life of the server and networking hardware, they should be maintained in a cool environment. Our self coooling racks restarts automatically after power failures for continual protection.
Active Directory Server
Built on top of LDAP, Active Directory is a centralized database for managing many type of components including user credentials. Offered on the Linux platform, this implementation allows for access integration across multiple business applications.
A print server lets computers on a network access a shared network printer. Print servers are therefore useful even on very small networks, since they avoid having to move files from computer to computer before printing.
A file server is a computer attached to a network that provides a location for shared files access. Shared storage of computer files can be accessed and shared by employees simulataneously. Files can be shared between departments increasing efficiency and productivity.
A relational database server offers an organized mechanism for storing, managing and retrieving information. Far more powerful than spreadsheets, a database coupled with a business application can help manage and protect large amounts of data.
Secure FTP Server
A computer that uses the File Transfer Protocol in secure mode in order to upload or download files across the Internet safely. The server is known to also support website updates and modifications as well as an alternate method for backing up files from a local device.
An email server is a computer that acts like a postal service worker. It delivers and receives electronic mail used for communication. This server combines three mini-servers; SMTP, POP3, and IMAP to provide an effective means of passing letters and notes.
Advanced Antispam Server
An antispam server enhances your email server by limiting unwanted and often dangerous email from entering into your email server. Antispam serves as both a security deterrent and a productivity enhancer by reducing the amount of email you will need to sort through daily.
There are nearly 2 billion websites on the world wide web. These websites become available for others to view and access through the use of a web server. Web servers are computers that deliver website content.
Web Office Server
An online office suite integrated with a collaboration platform to manage documents, projects, team and customer relations in one place. This server provides you with a secure way to create, edit, share and collaborate on business documents online via the Internet.
Document Cloud Server
A file share and communication platform used to access and synchronize your files, contacts, calendars and communicate and collaborate across your devices. Supports desktops, tablets and smart phones.
Web Traffic Server
A traffic server is a highly scalable caching proxy server capable of handling large volumes of concurrent requests while maintaining a very low latency. Improves your response time, while reducing server load and bandwidth needs by caching and reusing frequently-requested web pages, images, and web service calls.
An application server is similar but different in function than a web server. Though they both server HTTP reqeusts, an application server has an additional framework that provides a comprehensive service layer. Many cloud offerings are application servers, such CRM, HRM, and ERP. Your Cloud-In-A-Box affords you total control of your data.
Wiki Information Server
Wiki is a piece of server software that allows users to freely create and edit Web page content using any Web browser. Share pertinent information to world about your product, service and organization. Wiki servers are also used as support portals to provide around the clock assistance to customers while minimizing payroll and wages.
On-Demand Video Server
Video on demand (VOD) is a programming system which allows customers to select and watch/listen to video or audio content such as training videos whenever they choose, rather than at a scheduled broadcast time. Another great time saver and reduction in force assistant providing increased customer interaction.
1 & 10 Gigabit Networking
Denial of Service Defense
Access Control Lists
Quality of Service
Layer 2 & 3 Routing
Multi & Load Balanced WAN
Email Security Platform
Email Bagging Service
Secure Webmail and Mobile Mail
Secure Voice Platform
Customer Relationship Manager
Human Resource Management
Enterprise Resource Planning
Accounting & Invoicing
Team Document Collaboration
Secure File Sharing
Content Management System
Education & School Management
Website & Blog Hosting
E-commerce Shopping Cart
Private Groupware Mail Server
Private Secure File Servers
Business Phone Systems
Remote Virtual Desktops
Collaborative Content Management
On Demand Video Sharing
System High Availability
Application High Availability
Secure Off-site Data Replication
Secure Off-site Backup
Load Balanced Servers
Help Desk Personnel
On-Site Visitation & Support
Real-Time System Monitoring
Real-Time Performance and Health
Long Distance Worker Support
Data Center Design
Not all features available for all products.