JT s Cloud Service. Infrastructure as a Service (IaaS) Service Description. Page 1
|
|
- Andrew Black
- 8 years ago
- Views:
Transcription
1 JT s Cloud Service Infrastructure as a Service (IaaS) Service Description Page 1
2 Contents 1. Executive Summary Positioning and Context Market Drivers for Public Cloud Computing 4 2. Service Summary Infrastructure -as-a-service Concept Overview Differentiator Key Benefits Further Information URLs 5 3. Feature Highlights Ease of Access and Use Enterprise Security & Compliance Enterprise Performance Enterprise Controls Commercial Model Delivery Model 7 4. IT Cloud Service Details JT IaaS Infrastructure Components JT IaaS Infrastructure Services 10 Page 2
3 1. Executive Summary Infrastucture-as-a-Service (IaaS) from JT is an enterpriseclass cloud service provided via the Internet in a scalable, pay-per-usage model, built using industry-leading hardware and software (referred to as the JT Cloud offering). The platform is fully automated and orchestrated via purpose-built software, and comprises of servers, storage and network elements coupled with virtualisation and operating system software. The Channel Island cloud platforms are hosted in secure JT owned and managed data centres located in Guernsey and Jersey, with access to two additional platforms situated in London and Amsterdam Positioning and Context Several service models will exist for cloud computing (see figure above), including Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructureas-a-Service (IaaS). Cloud IaaS can also be segmented by its accessibility. These key segments are public or private clouds. The cloud service from JT addresses the Public Cloud segment offering Infrastructure as a Service including numerous operating systems, SQL and Microsoft SharePoint 1.1. Positioning and Context Page 3
4 1. Executive Summary 1.2. Market Drivers for Cloud Computing Today organisations of all sizes are facing challenges unlike any they ve experienced before. Globalisation is changing the business landscape, increasing the pressure to expedite time to market with new products and services, while keeping costs down. In addition, constant technology change has resulted in ad-hoc infrastructure build, creating complex IT infrastructures that prevent IT organisations from functioning as service providers to the business. Cloud technology solves this issue and enables IT to be delivered as a service, on demand, and with elastic scalability at a cost effective price point. Cloud computing is a style of computing that provides on-demand, self-service access to servers, applications and software development platforms. JT s IaaS is based on the standard cloud-computing model, which makes infrastructure resources available to businesses over the Internet. Public cloud services are offered on a pay-per-usage scheme with scalability and security to ensure IT services are not compromised. Page 4
5 2. Service Summary 2.1. Infrastructure-as-a-Service Concept Overview The JT IaaS Cloud service provides JT customers with a secure and segmented hosting environment with server, storage, and network elements that are logically isolated from other customers running on the same infrastructure. With the JT s Infrasructure-as-a-Service, customers can: Deploy virtual servers onto their own Layer 2 cloud networks using OS images provided by JT or by the customers. Deploy as many network segments as they require, allowing servers to remain isolated from each other. Independently customise the firewall and load balancing capabilities of each network. Manage both the cloud networks and servers through an online interface or a REST-based Application Programme Interface (API). Control their users using role-based permissions. JT s IaaS service is deployed in JT owned operated and approved data centres and is available under a variety of usage-based pricing plans. Additionally, the Cloud IaaS service from JT is enterpriseclass grade, built using industry-leading hardware and software. The service is accessible anytime via the Internet from anywhere in the world based on an SLA of 99.95% uptime and is fully automated and orchestrated via purpose-built software. It comprises servers, storage, and network, coupled with virtualisation technology and operating system software Differentiator The JT Cloud IaaS service is a comprehensive set of services and solutions designed to help organisations make the transition to the cloud. JT in conjunction with our partners, has the solution breadth required to solve the cloud migration problem that, to date has left organisations with inadequate and incomplete cloud implementations Key Benefits JT s Cloud IaaS is a pre-integrated and fully managed platform which significantly expedites new product and service introduction to the market and reduces operational risks associated with building a private cloud in-house. Additional benefits include: Pay by the hour and only for what s used, with no additional commitment. Rich online community to share and collaborate with peers. Web interface plus a complete set of APIs. Industry standard technology, including VMware, Cisco and EMC Further Information URLs Page 5
6 3. Feature Highlights 3.1. Ease of Access and Use Pay by the hour and only for those resources used (e.g. Random Access Memory (RAM), Central Processing Unit (CPU), Storage and bandwidth) or purchase a monthly plan at a discount Web-based administrative interface plus a complete set of APIs Global import and export for client server images Rich online community to share and collaborate with peers 3.2. Enterprise Security & Compliance Virtual private clouds with user-determined public Internet connectivity Unique customisable firewalls for security Virtual Private Network (VPN) administration of all servers Unique username/password for each administrator Role-based permissions controlling the activities of each administrator Audit logs of all environmental changes made by administrators 3.3. Enterprise Performance Multi-tier architecture Anti-affinity for extra redundancy Industry standard technology, including VMware Hypervisor and Cisco networking Network and Server uptime SLA 3.4. Enterprise Controls Centralised control and billing In-depth usage reporting by asset Audit log reporting by user and department 24x7x365 phone support with ticketing/status tracking Page 6
7 3. Feature Highlights 3.5. Commercial Model Customers pay for the resources (RAM, CPU, etc.) that they use on an hourly basis. Additionally there are monthly pre-paid plans available where customers can pay in advance each month for a set of resources and receive a discount. The pricing elements that are used to compute charges for customers include: CPU Hours RAM Hours Storage Hours Cloud Networks (per Hour) Additional Public IP addresses (per Hour) Outbound Bandwidth (GB) Sub-Administrator (per Hour) Software units (per Hour) 3.6. Delivery Model JT provides comprehensive, on-going management of the entire JT Cloud infrastructure. This includes responsibility for maintaining the underlying operating systems, VMware software, OS images, network, and storage devices. Management processes address the key elements of implementation, change control, monitoring, patching, and lifecycle management so that cloud availability and performance can be maintained. Customers will have their account created though a JT Global Enterprise sales representative. Once the customer has log in credentials, they can start using the system (creating networks, deploying servers, etc.). They are billed for their usage once a month. JT has implemented a multi-tiered service delivery model for delivering Cloud services. here is also a Cloud Community portal that offers access to a comprehensive knowledge base of Cloud solutions, tips and support related articles, which can act as first port of call for customer queries. JT in conjunction with its partners will be responsible for supporting clients via the JT Service Management Center (SMC). The JT SMC is staffed 24x7x365 to provide support. Page 7
8 4. IT Cloud Service Details The JT IaaS offering comprises of the following: Infrastructure Components Cloud Networks Cloud Servers Storage for Cloud Servers Open APIs Infrastructure Services Public IaaS Infrastructure Public IaaS Management Public IaaS Security Public IaaS Cloud Support Public IaaS Service Level Guarantee 4.1. Infrastructure Components Cloud Networks Unlike competing solutions that use flat network architectures, JT s IaaS deploys all cloud servers on customer-specific Layer 2 network VLANs using a Ciscobased switching fabric. Customers can deploy as many of these network segments as they require, allowing servers to remain isolated from each other from a network perspective. Each network includes firewall and load balancing capabilities and can be independently customised based on specific needs. Customers can build multi-tier network architectures to separate data tiers from front-end web tiers, thereby providing an additional layer of firewall rules to protect sensitive data. Cloud Networks are deployed and managed either through the Administrative User Interface or through corresponding functions of the Open API. Each Cloud Network has its own private IP address space that isolates the customer s Cloud Servers from the public Internet. Cloud Servers are assigned private IPs when they are deployed and only become accessible to the public Internet when administrators specifically enable such access through a Network Address Translation (NAT) or Virtual IP Address (VIP). With this approach, Cloud Servers are completely isolated from the public Internet unless the Network Administrator establishes connectivity to them. Page 8
9 4. IT Cloud Service Details Cloud Servers JT s Cloud IaaS deploys virtual servers using VMware s industry-leading vsphere virtualisation platform, and supports popular operating systems including RedHat Linux, Microsoft Windows, CentOS, and Ubuntu. While most competing services force a selection from a list of pre-defined server types, the cloud solution provides granular control over the configuration of a customer s virtual servers, including the number of virtual CPUs, the amount of RAM, and the amount of local tiered storage allocated to the virtual server. Furthermore, servers are deployed and managed either through the Administrative UI or through corresponding functions of the Open API. Additional features include: Licensing for the underlying Operating System is included with the service, allowing automated patch updates through Red Hat Network and Microsoft Windows Update Services. Full server management capabilities including start, shutdown, reboot, power off, restart, delete, add local storage, or change CPU/RAM. Static private IP address are assigned to all servers and accessible via VPN, and are mapped to static public IP addresses only as required. Role-based administration control over which administrators can manage servers, networks, images, and reports. Cloning ability to duplicate virtual servers to create customer images which can be used to deploy copies of a server configuration. Capability to import/export server images worldwide which can be used to transfer virtual machines to and from a customer s own infrastructure. Anti-Affinity capability to isolate virtual machines on separate physical infrastructure for extra redundancy Open APIs Open APIs provide customers with easy-to-use RESTbased APIs, designed to allow seamless control over all aspects of a customer s Cloud Servers and Cloud Networks. The Open API mirrors almost all functions available through the Administrative UI, including: Full management capabilities over servers including start, shutdown, reboot, power off, restart, delete, add local storage, or change CPU/RAM. Ability to clone a server to create a customer image (virtual copy). Creation, deletion, and control of networks (including ACL rules, NAT, VIP, and public IP addresses). Creation, deletion, and management of Cloud Files accounts. Import and Export of Customer Images as well as ability to copy Customer Images between different locations Routable Private IP Addressing Addressing provides customers with the ability to establish secure communications between Cloud Servers located on different Cloud Networks through routable Private Internet Protocol (IP) addresses. Private IP addresses within the Cloud are routable, allowing Cloud Servers on different Cloud Networks to communicate with each other, subject to the firewall rules of each Cloud Network. This functionality allows customers to establish secure communications on different VLANs in the environment without exposing public IP addresses to the public Internet. Page 9
10 4. IT Cloud Service Details 4.2. Infrastructure Services The infrastructure is designed to be a reliable, highavailability platform. It incorporates N+1 redundancy into the network, compute, and storage layers to ensure a resilient solution capable of recovering from a component failure OS License Management JT provides the operating system licensing entitlements for all JT Cloud Server deployments from OS Images within the Cloud infrastructure as part of the service and at no additional charge. These operating system licenses include Microsoft Windows Server, SharePoint and RedHat Enterprise Linux Management JT through its partner Dimension Data, maintains and monitors its entire cloud infrastructure, including the underlying VMware software, OS images, network, and storage devices. The management processes address the key elements of implementation, change control, monitoring, patching, and lifecycle management so that cloud availability and performance can be maintained. These processes are audited yearly through the SSAE- 16 attestation, which is based on an in-depth series of documented controls covering the operational management of the JT Cloud infrastructure. Multipoint monitoring systems scrutinise key system parameters, system availability, network, and the overall customer experience 24x7x365 to ensure the highest possible uptime and performance. Nimsoft Monitoring Software is leveraged to provide comprehensive monitoring coverage of the Cloud including the underlying network, VMware vcenter, ESX hosts. Should issues be detected by monitoring, the 24x7x365 Cloud Support team coordinates the response. Page 10
11 4. IT Cloud Service Details Security Addressing provides customers with the ability to Security in a Cloud environment requires a multi-pronged approach. In IaaS service offerings, much of the overall security burden rests with the customer, as the customer is responsible for their network configurations and maintenance of the underlying virtual servers. However, JT plays an important role in securing both the overall infrastructure and the cloud management software layer Customer Security Features The JT Cloud service is designed to provide customers with the flexibility to configure the environment to their needs. A full definition of the requirements of securing a cloud environment is beyond the scope of this document; much depends on the customer s application design and underlying requirements. However, it s important to point out some of the unique features described in the product sections above: Cloud Servers are deployed with private IP addresses that isolate them from the public Internet. Connectivity with the public Internet occurs only when a customer maps public IP addresses on the Cloud Network to the Cloud Server using VIP or NAT functions. The VIP functionality is particularly powerful, allowing customers to isolate allowed traffic to specific public IP ports. The service includes Client-to-Site VPN connectivity that allows the customer s administrators to access the private IP addresses of the Cloud Servers through a secure, encrypted tunnel. This solution avoids the most common security problems associated with Cloud deployments where direct access to the Cloud Server through SSH/RDC occurs over public IP networks, leaving the sessions open to potential brute-force or sniffing attacks. Customers have full control over the login credentials on the Cloud Servers themselves, and can configure their own user-authentication environments on these servers. Private IP addresses are routable between Cloud Networks, allowing customers to configure multi-tier network architectures with separate layer 2 VLAN for each layer. This allows each application tier to be isolated by separate firewall policies, allowing customers to lock down traffic to the specific ports and servers expected by their design. The private IP address space is also routable between different cloud locations, with traffic flowing across a secure site-to-site VPN tunnel. This allows Cloud Servers in different data centres to securely communicate with each other. The Cloud Management software allows customers to assign role-based permissions to different administrators on their account; ensuring users only have the capabilities assigned to them. The system also provides audit logging of all administrative actions taken through the Cloud Management Admin UI or API. Fully licensed Operating Systems for servers deployed from our OS Images provide customers access to the latest security patches from our vendors. Page 11
12 4. IT Cloud Service Details Infrastructure Security Features JT takes an extensive, in-depth approach to securing the public cloud environment itself. At the infrastructure and multi-tenant application layers, JT is guided by a Dimension Data defense-in-depth security strategy, in which a series of security layers are implemented so that no single solution is relied upon to provide security Data Centre Security Highly secure 24x7x365 monitored hosting centre 24x7x365 Live Monitored CCTV Internal and External Surveillance covering all critical areas including all entrances and exits customer racks and Data Centre infrastructure External security gates and internal doors fitted with Host-based Intrusion Detection System HID Card + Pin access system. A 4 digit pin code is required which is changed on a weekly basis. HID cards are assigned with limited access to customer based areas only. 3GS intruder detection system which forms part of the HID card access system. Intrusion detection is monitored 24x7 by a dedicated UK call centre which is in operation 365 days a year. The Intruder alarm system also forms part of our internal Building Management System which controls the data centre Mechanical and Electrical (M&E) systems, it is monitored 24x7x365 by fully trained dedicated staff. Syncro AS (EU: EN54-2:1997 and EN ) Fire Alarm System. The Fire Alarm system is monitored by a call centre which is in operation 365 days a year. The Fire Alarm system also forms part of our internal Business Management System which is monitored 24x7x365 by fully trained dedicated staff. VESDA (Very Early Smoke Detection Apparatus) monitors the Data Centre environment. VESDA is an air sampling device which uses a class 1 laser to detect up to 1 part per million. FM-200 waterless automated fire suppression system able to discharge in less than 10 seconds and suppress a fire immediately. All visitors to the JT Data Centres, including customers, JT Staff and contractors are subject to constant CCTV monitoring. Access to customer racks by internal customer staff, JT staff or sub-contractors has to be approved by the customer in writing. Our approved security contractor provides on-site guarding for maximum security. Our Data Centres are subject to two external evening patrols by our security contractor guards, 365 days a year and an additional two visits on weekends and Bank Holidays during the day time. All incoming mains power supplies, internal power switching equipment, UPS, generators and computer room air conditioning units are fully maintained by our approved contractor and monitored by our dedicated building management system and fully trained Data Centre certified members of staff 24x7x365. Page 12
13 4. IT Cloud Service Details Cloud Management Software Security JT s Cloud software enforced multi-tenant security across all Cloud functions, which also supports rolebased permissions allowing customers to define which functions can be managed by which users within their organisation. Fully managed Intrusion Detection System (IDS) utilising signature, protocol and anomaly-based inspection method provide around-the-clock monitoring of the Cloud Management software. This includes both a Network Intrusion Detection System (NIDS) and a Hostbased Intrusion Detection System (HIDS) to ensure our multi-tenancy controls are not compromised. No customer passwords stored in clear text in any code or on any system Infrastructure Security The entire Cloud Platform network (including customer s Cloud Networks) is defended using Networks Peakflow solution for edge-to-edge security, visibility and carrier-class threat management and remediation. JT s Cloud Management software and infrastructure is protected by additional security layers including: Intrusion detection and threat identification using Alert Logic s Threat Manager and ActiveWatch services, which provide 24x7x365 monitoring, detection and response to network incidents affecting the Cloud Management layer. Host-Based Intrusion Detection agents to monitor OS and application-level issues affecting the Cloud Management layer. JT and or its partners also regularly review vendor and third party security bulletins and patch updates to identify and recommend patches necessary for the infrastructure systems. This approach ensures both the infrastructure and OS images remain up-todate with the latest security fixes from the underlying vendors. Dimension Data s Security Incident Response Team (SIRT)handle reports of security incidents. The SIRT will escalate the incident to law enforcement and/ or executive management as prescribed in security policies. 24x7x365 Firewall and VPN support and maintenance. Page 13
14 4. IT Cloud Service Details Change Control Process and Procedures The objective of the change management process is to ensure the proper planning and co-ordination of the implementation of all changes to the form, fit, or function of a given system, device, or configuration. This in turn allows the coordination and planning of changes in order to provide a stable production environment, minimising the impact of necessary changes and ensuring adherence to Service Level Agreements. The purpose of change management is to ensure the contemplated change is fully planned, documented and tested and that all affected parties understand and approve of the change prior to implementation. Change management also includes the establishment of standard and emergency maintenance windows, as well as authorisation levels and processes Cloud Support JT s monitoring systems report to a central aggregation engine that drives JT Cloud customer care and technical support for all emergencies or after hour s client-to JT Support. The Service Management Center has the tools, technology, and administrative expertise to effectively support customer environments, including: 24x7x365 staffing with experienced technicians. Level 1 industry expertise to resolve Severity 1 and Severity 2 issues immediately. In-depth domain knowledge. Escalation management expertise. Page 14
Private Compute-as-a-Service
BROCHURE PRIVATE COMPUTE-AS-A-SERVICE Private Compute-as-a-Service Today, organisations of all sizes are facing challenges unlike any they ve experienced before. Globalisation and economic pressures are
More informationPublic Compute-as-a-Service
Public Compute-as-a-Service Advantage BSNL IDC India s first Uptime Institute Certified Tier-III data centres with combined connectivity and IT services availability from BSNL Low latency Internet Data
More informationDimension Data Hosted Private Compute-as-a-Service
Dimension Data Hosted Private Compute-as-a-Service Today, organisations of all sizes are facing challenges unlike any they ve experienced before. Globalisation and economic pressures are changing the business
More informationPublic Compute-as-a-Service
Public Compute-as-a-Service Today, organisations of all sizes are facing challenges unlike any they ve experienced before. Globalisation and economic pressures are changing the business landscape, increasing
More informationDimension Data Hosted Private Cloud
Dimension Data CONTACT INFO Andy Lancaster E: andy.lancaster@dimensiondata.com P: +44 12 5277 9649 1 Contents 1 Service Description... 3 1.1 Service Overview... 3 1.2 Service Features... 4 2 Service Management...
More information<cloud> Secure Hosting Services
Global Resources... Local Knowledge Figtree offers the functionality of Figtree Systems Software without the upfront infrastructure investment. It is the preferred deployment solution for organisations
More informationAccelerate with Ampleflex Cloud! Highly adoptable and dependable platform for deploying services and applications into the Cloud. www.ampleflex.
Accelerate with Ampleflex Cloud! Highly adoptable and dependable platform for deploying services and applications into the Cloud. www.ampleflex.com The Challenge Enterprises are updating applications to
More informationCloud Security: Developing a Secure Cloud Approach
white paper Cloud Security: Developing a Secure Cloud Approach Critical questions you should ask your cloud provider Businesses are facing IT and data management challenges unlike those they ve ever experienced.
More informationColocation, Cloud and Managed Services
Colocation, Cloud and Managed About Node4 At Node4 our growing team of passionate individuals are dedicated to delivering the most effective application of technology to optimise business performance.
More informationA Secure Cloud Platform For egaming
A Secure Cloud Platform For egaming JT CLOUD Mark Stuchfield, VP, Business Development, JT Lab & egaming mark.stuchfield@jtglobal.com consultancy voice & data cloud & hosted solutions internet security
More informationSaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
More informationContents UNIFIED COMPUTING DATA SHEET. Virtual Data Centre Support. www.interoute.com
Contents Scope of this Document... 2 Product Overview... 2 Virtual Data Centre and VDC Dedicated Infrastructure... 2 Service Levels... 3 Severity and Support Response Times... 4 On-boarding... 5 Incident
More informationTable of Contents. CSC CloudCompute Service Description Summary CSC 1
Table of Contents Overview... 2 CSC CloudCompute Infrastructure... 2 Virtual Environment... 2 Compute Capacity... 2 Networks... 3 CSC Cloud Store Overview... 3 Service Tier Choices... 3 CloudCompute Storage...
More informationProduct Overview. UNIFIED COMPUTING Managed Hosting Compute Data Sheet
Product Overview Interoute provide our clients with a diverse range of compute options delivered from our 10 carrier-class data centre facilities. Leveraging our extensive and diverse next generation IP
More informationVirtual Server Hosting Service Definition. SD021 v1.8 Issue Date 20 December 10
Virtual Server Hosting Service Definition SD021 v1.8 Issue Date 20 December 10 10 Service Overview Virtual Server Hosting is InTechnology s hosted managed service for virtual servers. Our virtualisation
More informationRestricted Document. Pulsant Technical Specification
Pulsant Technical Specification Title Pulsant Government Virtual Server IL2 Department Cloud Services Contributors RR Classification Restricted Version 1.0 Overview Pulsant offer two products based on
More informationVirtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
More informationProduct Overview. UNIFIED COMPUTING Managed Hosting Compute
Product Overview Interoute provide our clients with a diverse range of compute options delivered from our 10 carrier-class data centre facilities. Leveraging our extensive and diverse next generation IP
More informationINTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
More informationCloudSure Managed IaaS
CloudSure Managed IaaS Contents Contents... 1 Overview - CloudSure... 3 CloudSure Benefits... 3 CloudSure Features... 3 Technical Features... 4 Cloud Control... 4 Storage... 4 Data Location and Integrity...
More informationCA Cloud Overview Benefits of the Hyper-V Cloud
Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter
More informationSaaS architecture security
Introduction i2o solutions utilise the software as a service (or SaaS) model because it enables us to provide our customers with a robust, easy to use software platform that facilitates the rapid deployment
More informationREDCENTRIC INFRASTRUCTURE AS A SERVICE SERVICE DEFINITION
REDCENTRIC INFRASTRUCTURE AS A SERVICE SERVICE DEFINITION SD021 V2.2 Issue Date 01 July 2014 1) OVERVIEW Redcentric s Infrastructure as a Service (IaaS) enables the to consume server, storage and network
More informationRemote Voting Conference
Remote Voting Conference Logical Architecture Connectivity Central IT Infra NIST Best reachability in India for R-Voting Initiative 200+ Physical MPLS POPs across India 5 Regional Data Centre at Pune,
More informationInfrastructure, application services, and managed services - all in a single, integrated platform CENTURYLINK S END-TO-END MANAGEMENT SOLUTIONS:
CenturyLink Cloud Infrastructure, application services, and managed services - all in a single, integrated platform Businesses like yours are moving their apps to CenturyLink Cloud. All signs point to
More informationSINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD POWERED BY MICROSOFT
SINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD POWERED BY MICROSOFT SingTel Managed Cloud, powered by Microsoft, is a secure and agile cloud computing solution (Infrastructure-as-a-Service or IaaS)
More informationWHITE PAPER: PAN Cloud Director Technical Overview
WHITE PAPER: PAN Cloud Director Technical Overview July 2015 1. Introduction PAN Cloud Director (PCD) is a comprehensive cloud management solution that lets both, IT organizations and service providers
More informationAccenture Cloud Enterprise Services
BMC User Forum 2011 Accenture Cloud Enterprise Services Martin Jureit, Accenture GmbH Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda Accenture Cloud Enterprise
More informationLecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
More informationVirtual Datacenter. You ve built your business making smart decisions. Here s another. Why Choose CenterBeam?
Virtual Datacenter You ve built your business making smart decisions. Here s another. Business Benefits: Utility pricing subscribe vs. build model Flexibility transition when it makes business sense Scalability
More informationSecurity and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser
Security and Billing for Azure Pack Presented by 5nine Software and Cloud Cruiser Meet our Speakers Symon Perriman VP of Business Development 5nine Software symon@5nine.com @SymonPerriman Paul Zinn Senior
More informationCompetitive Comparison Between Microsoft and VMware Cloud Computing Solutions
Competitive Comparison Between Microsoft and VMware Cloud Computing Solutions Introduction As organizations evaluate how cloud computing can help them improve business agility, reduce management complexity
More informationCloudDesk - Security in the Cloud INFORMATION
CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES
More informationVMware for your hosting services
VMware for your hosting services Anindya Kishore Das 2009 VMware Inc. All rights reserved Everybody talks Cloud! You will eat your cloud and you will like it! Everybody talks Cloud - But what is it? VMware
More informationOur Cloud Offers You a Brighter Future
Our Cloud Offers You a Brighter Future Qube Global Software Cloud Services are used by many diverse organisations including financial institutions, international service providers, property companies,
More informationProactively Secure Your Cloud Computing Platform
Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud
More informationArchitecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
More informationService Description CloudSure Public, Private & Hybrid Cloud
Service Description CloudSure Public, Private & Hybrid Cloud Table of Contents Overview - CloudSure... 3 CloudSure Benefits... 3 CloudSure Features... 3 Technical Features... 4 Cloud Control... 4 Storage...
More informationCisco Hybrid Cloud Solution: Deploy an E-Business Application with Cisco Intercloud Fabric for Business Reference Architecture
Reference Architecture Cisco Hybrid Cloud Solution: Deploy an E-Business Application with Cisco Intercloud Fabric for Business Reference Architecture 2015 Cisco and/or its affiliates. All rights reserved.
More informationCisco Unified Computing Remote Management Services
Cisco Unified Computing Remote Management Services Cisco Remote Management Services are an immediate, flexible management solution that can help you realize the full value of the Cisco Unified Computing
More informationACME Enterprises IT Infrastructure Assessment
Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3
More informationService Definition. Hyve Government Cloud Servers - Small (IaaS)
Service Definition Hyve Government Cloud Servers - Small (IaaS) Hyve Government Cloud Servers -Small Hyve's Government Cloud Servers are delivered to Government customers via the e-procurement portal as
More informationService Definition. Hyve cloud based Virtual Desktop (PaaS)
Service Definition Hyve cloud based Virtual Desktop (PaaS) Hyve cloud based Virtual Desktop (PaaS) Hyve's cloud based Virtual Desktop VDI is delivered to Government customers via the e- procurement portal
More informationCLOUD SERVICE SCHEDULE Newcastle
CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,
More informationCloud Vendor Evaluation
Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business
More informationHosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationDimension Data Cloud Technical Security Overview
white paper Cloud Technical Security Overview The Managed Cloud Platform (MCP) provides a secure and scalable cloud computing platform with a network-centric design with multiple layers of security for
More informationCloud Security: An Independent Assessent
Cloud Security: An Independent Assessent A Quantix White Paper Dec 2010 Call us on: 0115 983 6200 Visit us on-line at: www.quantix-uk.com E-mail us at : enquiries@quantix-uk.com Why are people concerned
More informationDimension Data Cloud Technical security overview
Dimension Data Cloud Technical security overview Dimension Data s Managed Cloud provides a secure and scalable cloud platform with a network-centric design and multiple layers of security for the delivery
More informationCHOOSING A RACKSPACE HOSTING PLATFORM
CHOOSING A RACKSPACE HOSTING PLATFORM Rackspace has years of experience in hosting and has learnt that the unique needs of our customers businesses often determines the level of accountability and project
More informationVyatta Network OS for Network Virtualization
Complete Security and Compliance for Virtual Environments Vyatta takes the concept of virtualization beyond just applications and operating systems and allows enterprise IT to also virtualize network components
More informationRequest for Information (RFI) for Managed Hosting Service
FOOD AND AGRICULTURE ORGANIZATION OF THE UNITED NATIONS ORGANISATION DES NATIONS UNIES POUR L ALIMENTATION ET L AGRICULTURE ORGANIZACION DE LAS NACIONES UNIDAS PARA LA AGRICULTURA Y LA ALIMENTACION Viale
More informationMicrosoft Cloud Platform System. powered by Dell
Microsoft Cloud Platform System powered by Dell Contents Introduction... 3 Customer Expectations... 3 Microsoft Cloud Platform System powered by Dell... 3 Components and Structure... 5 Logical Architecture...
More informationService Definition. Hyve cloud based Microsoft Exchange hosting (PaaS)
Service Definition Hyve cloud based Microsoft Exchange hosting (PaaS) Hyve cloud based Microsoft Exchange hosting Hyve's cloud based Microsoft Exchange hosting is delivered to Government customers via
More informationPlanning the Migration of Enterprise Applications to the Cloud
Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction
More informationDimension Data Cloud Services
Cloud Services Cloud Services Today, organisations of all sizes are facing challenges unlike any they ve experienced before. Globalisation and economic pressures are changing the business landscape, increasing
More informationJK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
More informationPlatform as a Service
Platform as a Service Service Definition Version: 1.0 Version date: October 2015 Classification: Public Backup-as-a-Service Systems Monitoring DR-as-a-Service Storage-as-a-Service Hosted Exchange Colocation
More informationBuild A private PaaS. www.redhat.com
Build A private PaaS WITH Red Hat CloudForms and JBoss Enterprise Middleware www.redhat.com Introduction Platform-as-a-service (PaaS) is a cloud service model that provides consumers 1 with services for
More informationVendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
More informationSaaS Security for Confirmit Horizons
SaaS Security for Confirmit Horizons January 2015 Confirmit Horizons v18.5 Arnt Feruglio Chief Operating Officer The Confirmit Horizons Software From its inception in 1997, the architecture and code of
More informationNIS s Cloud Server is an enterprise-grade cloud application infrastructure designed specifically for small and mediumsized
NIS s Cloud Server TECHNICAL GUIDE INTRODUCTION NIS s Cloud Server is an enterprise-grade cloud application infrastructure designed specifically for small and mediumsized businesses. Cloud Server lets
More informationCAPABILITIES STATEMENT
CAPABILITIES STATEMENT TABLE OF CONTENTS About Entity Data 1 Customer Benefits 2 Why Choose Entity Data 3 Our Data Centre 5 Our Solutions > Solutions Overview 6 > Enterprise Virtualisation 7 > Host Security,
More informationCSC BizCloud VPE Service Offering Summary. CSC i
Table of Contents OVERVIEW... 1 BIZCLOUD VPE SOLUTION SUMMARY... 1 BIZCLOUD VPE INFRASTRUCTURE... 1 Hardware and Virtualization Layer... 2 Compute Components... 2 Storage 2 CSC SUPPORT FOR THE BIZCLOUD
More informationSINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD SERVICE (SINGTEL IAAS)
SINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD SERVICE (SINGTEL IAAS) SingTel Managed Cloud Service delivers greater flexibility, security, cost efficiency and convenience. Looking for a way to reap
More informationWhite Paper: An Evaluation Framework For Selecting an Enterprise Cloud Provider
White Paper: An Evaluation Framework For Selecting an Enterprise Cloud Provider Introduction 3 Enterprise Cloud Evaluation Framework Overview 4 Enterprise-Grade and Industry-Standard Comprehensive and
More informationC a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l s @ t e r r e m a r k. c o m
Cloud Computing for Government & Enterprise C a r l G o e t h a l s T e r r e m a r k E u r o p e C a r l. g o e t h a l s @ t e r r e m a r k. c o m Agenda Some history on Terremark State of Cloud Public
More informationNetwork Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
More informationVirtual Hosting Service Definition SD021 V1.5 Issue Date 18 Sept 09
Virtual Hosting Service Definition SD021 V1.5 Issue Date 18 Sept 09 Service Overview Introduction Virtual Hosting is InTechnology s hosted managed service for virtual servers. Our virtualisation service
More informationHow To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
More informationCONTINUOUS LOG MANAGEMENT & MONITORING
OFFERING BRIEF: CONTINUOUS LOG MANAGEMENT & MONITORING ALERT LOGIC LOG MANAGER AND ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER Virtually every system you use to manage and run your business creates log data.
More informationTELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE
TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including
More informationCloudPassage Halo Technical Overview
TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure
More informationLeveraging the Private Cloud for Competitive Advantage
Leveraging the Private Cloud for Competitive Advantage Introduction While it is universally accepted that organisations will leverage cloud solutions to service their IT needs, there is a lack of clarity
More informationSimplified Private Cloud Management
BUSINESS PARTNER ClouTor Simplified Private Cloud Management ClouTor ON VSPEX by LOCUZ INTRODUCTION ClouTor on VSPEX for Enterprises provides an integrated software solution for extending your existing
More informationPCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
More informationFrankfurt Data Centre Overview
Technical Services Briefing Document Frankfurt Data Centre Overview Version 2.1 Contents Introduction... 3 TelecityGroup Data Centre in Frankfurt... 4 Data Centre Characteristics... 4 Technologies in Use
More informationIaaS Request for Proposal Template
IaaS Request for Proposal Template Created by the Dimension Data Cloud Business Unit Created by Dimension Data Page 1 of 24 Release Version Date released Pages affected Remarks 1 02.03.14 All Initial creation
More informationTable of Contents. Page 1 of 6 (Last updated 30 July 2015)
Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational
More informationSecuring the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
More informationSecurity April 2015. Solving the data security challenge with our enhanced private and hybrid cloud services
Security April 2015 Secure cloud solutions with guaranteed UK data sovereignty. Solving the data security challenge with our enhanced private and hybrid cloud services This paper enables discussion around
More informationCautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
More informationLayered Tech Cloud Data Center Service Guide
Guide v1.3, 11-28-2012 Cloud Data Center Service Description The Layered Tech Cloud Data Center (CDC) service platform offers a secure self-service cloud computing, storage, and networking environment
More informationFujitsu Private Cloud Customer Service Description
Fujitsu Private Cloud Customer Service Description Fujitsu Private Cloud forms part of Fujitsu Hybrid IT portfolio to address the full range of Customers requirements and business needs by providing agility
More informationPAAS Public Sector Managed Services
Meritec Limited Meritec House, Acorn Business Park, Skipton, North Yorkshire, BD23 2UE 0845 3451155 servicepoint@meritec.co.uk www.meritec.co.uk Registered In England & Wales No. 3224622 Table of Contents
More informationThe Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing
Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?
More informationGiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
More informationOur Services Dynamic Data Centre Infrastructure-as-a-Service.
Our Services Dynamic Data Centre Infrastructure-as-a-Service. 02 / TelecityGroup Dynamic Data Centre What is Dynamic Data Centre? Dynamic Data Centre (DDC) is TelecityGroup s Infrastructure-as-a-Service
More informationVMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
More informationCisco Intercloud Fabric for Business
Data Sheet Cisco Intercloud Fabric for Business Combining the Benefits of Public and Private Clouds in a Hybrid Cloud Cisco Intercloud Fabric for Business enables enterprises to create a seamless hybrid
More informationHow To Get The Most Out Of Redhat.Com
RED HAT ENTERPRISE VIRTUALIZATION AND CLOUD STRATEGY Aram Kananov EMEA Product Marketing Manager Platform and Cloud Business Units Red Hat 1 RED HAT BRINGS COMMUNITY, VENDORS, USERS TOGETHER 2 RED HAT
More informationBecome more agile with Cloud services
Become more agile with Cloud services and create cost-saving and security benefits for your busines Choose from a Private, Public, Hybrid or On-Premise Cloud service from NTT Communications ICT Solutions
More informationPart 1 - What s New in Hyper-V 2012 R2. Clive.Watson@Microsoft.com Datacenter Specialist
Part 1 - What s New in Hyper-V 2012 R2 Clive.Watson@Microsoft.com Datacenter Specialist Microsoft Cloud OS Vision Public Cloud Azure Virtual Machines Windows Azure Pack 1 Consistent Platform Windows Azure
More informationExpert tips for realizing maximum private cloud benefits
E-Guide Expert tips for realizing maximum private cloud benefits Today s enterprises either already have a private cloud, plan to build one or at least have considered in-house cloud as an option. But
More informationRE Cloud from Richardson Eyres
RE Cloud from Richardson Eyres Frequently asked Questions What is RE Cloud? RE Cloud is Richardson Eyres cloud computing service delivering virtualised, on demand multi tenant elastic computing resource.
More informationBridging the gap between local IT and Cloud services, keeping you in control
Bridging the gap between local IT and Cloud services, keeping you in control The majority of Small and Mid-Sized Businesses (SMB s) are expected to operate in a hybrid IT environment (part on-premise,
More informationBridging the gap between local IT and Cloud services, keeping you in control
Bridging the gap between local IT and Cloud services, keeping you in control The majority of Small and Mid-Sized Businesses (SMB s) are expected to operate in a hybrid IT environment (part on-premise,
More informationHow does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management
More informationA Cloud WHERE PHYSICAL ARE TOGETHER AT LAST
A Cloud WHERE PHYSICAL AND VIRTUAL STORAGE ARE TOGETHER AT LAST Not all Cloud solutions are the same so how do you know which one is right for your business now and in the future? NTT Communications ICT
More information