Los Angeles, CA, July 23, 2013 --(PR.com
)-- In response to the growing list of SMB and modest enterprises unable to deploy appropriate network security protections due to budget and resource restraints, CloudAccess, a leader in cloud-based security-as-a-service solutions, announced a series of low-cost, cloud-based deployment models.
The various bundles, which all contain intrusion detection, alerting (SIEM- security information event management) and system log archiving (Log Management) components, can now be acquired as a perpetual, one-time license fee or through a new budget-friendly monthly subscription. All the solutions provided are delivered and managed from the cloud. The perpetual license offers such services and 24/7 monitoring as an al a carte option, while the subscription models include security-as-a-service.
"We recognize the critical role security plays in an overall operation, but realize the scope and size of an organization does not always warrant a cumbersome and invasive investment in technology and resources," said CloudAccess CEO Kevin Nikkhoo. “Not only does a cloud security deployment address performance scope, but our new program creates a means for a company to mitigate network security risk based on need and budget. In this case one size does not fit all.”
According to a study by Ponemon Institute, upwards of 70% of companies do not have adequate IT security protection. Many of these companies are considered to be SMBs and smaller enterprises.
CloudAccess unveiled three new deployment models based on smaller technology footprints. Basing the costs on events per second (the number of activities that look to access a network), CloudAccess created modest entry point that fits the scale of most small business, yet still provides enterprise-class features including real-time monitoring and regulatory compliance reporting.
Information and pricing about the specific bundles can be found at www.cloudaccess.com/siem-log-management-combo
“The goal is to right-size deployment by first understanding scope,” Nikkhoo noted. “Why pay for 500 or 1000 events per second if you company only generates 250 or needs to monitor less than 100 devices. This is the best way to keep costs to a minimum and functionality to a maximum.”
CloudAccess now offers these scaled down bundles as both license and a subscription. Based on a companies need, scope or definition of total cost of ownership, they can choose to invest in just the technology as a one-time cost and add security-as-a-service options as needed, or apply a controlled scope package at a “below-market” cost.
When compared to point solutions for both SIEM and log management, this combination approach is significantly more cost effective. According to CloudAccess’ statistics, companies can apply a new SIEM and Log bundle for less than any singular cloud SIEM solution currently on the market and considerably less costly than any on-premise product. CloudAccess further asserts its features and functionality are equivalent to well-known and expensive on-premise brands.
"We recognize the balancing act between security, compliance and budget. We don’t feel a modest company should be forced to decide between one solution and another based on cost. We’ve made sure they can get both and greatly benefit from the enhanced capabilities," Nikkhoo added.
Contact CloudAccess at www.cloudaccess.com/contact to schedule a demo or call 877-550-2568 for more information.
CloudAccess specializes in a unique unified security platform that leverages the capabilities of intrusion detection, log archiving, user credentialing, provisioning, application authorization, automations, web access management, single sign-on and compliance reporting. In that this is 100% deployed and managed from the cloud creates better real time visibility, scalability, agility and affordability for any sized organization. REACT is the only cloud-managed offering on the market that incorporates all these key security capabilities (SIEM, Log Management, Identity Management and Access Management) from a multi-tenant configuration.