Established organizations can have the most comprehensive security feature set available in iconik.
Control who can access iconik and where they can access from with an IP Allowlist.
Reduce incident response times with near real-time log streaming fed directly to your SIEM system.
Configure a list of IP addresses or CIDR-prefixes from which users are allowed to access iconik
The IP Allowlist is enforced in the GUI and API
Restrict access for user groups so that they can only access from a certain network
Restrict access to certain IP addresses like company firewalls or gateways
Restrict individual users to only access through your company network to lock down high-privileged accounts
Monitor user activity in near real-time and receive alerts when suspicious activity is detected
React to threats in a timely manner with near real-time log feeds
Allows admins to monitor a log of all user actions within the system.
Stream and backup into your own infrastructure
Set up multiple message buses like Amazon SQS and Google Cloud Pub/Sub
The option to use iconik Shield can be turned on/off in the iconik Admin page.
Pricing information can be found in the iconik pricing calculator.