ICONIK
Protect your media with iconik Shield
Add iconik Shield for premium security features.
Enterprise-Level Security for Any Organization
Established organizations can have the most comprehensive security feature set available in iconik.
Gain More Ways to Configure Access Controls
Control who can access iconik and where they can access from with an IP Allowlist.
React Faster to Suspicious Activity
Reduce incident response times with near real-time log streaming fed directly to your SIEM system.
Iconik Shield delivers premium security features
TOUCH
IP Allowlist
Configure a list of IP addresses or CIDR-prefixes from which users are allowed to access Iconik
The IP Allowlist is enforced in the GUI and API
Restrict access for user groups so that they can only access from a certain network
Restrict access to certain IP addresses like company firewalls or gateways
Restrict individual users to only access through your company network to lock down high-privileged accounts
TOUCH
Log Streaming
Monitor user activity in near real-time and receive alerts when suspicious activity is detected
React to threats in a timely manner with near real-time log feeds
Allows admins to monitor a log of all user actions within the system.
Stream and backup into your own infrastructure
Set up multiple message buses like Amazon SQS and Google Cloud Pub/Sub
Add Iconik Shield to your security stack
The option to use iconik Shield can be turned on and off in the iconik Admin page.
Pricing information can be found in the iconik pricing calculator.