White Paper: simpro Software Data Centre

Size: px
Start display at page:

Download "White Paper: simpro Software Data Centre"

Transcription

1 White Paper: simpro Software Data Centre

2 White Paper: simpro Software Data Centre Where is the simpro Data Centre?... 1 Hong Kong (Primary Data Centre)... 1 Chicago (Secondary Data Centre)... 1 What About Data Redundancy?... 2 Layer Layer Layer Can You Explain More About Your Network?... 3 How Secure (Physically and Digitally) is the Data Centre?... 4

3 Where is the simpro Data Centre? Good question, we actually have several locations for our data centres: Hong Kong (Primary Data Centre) Our primary data centre provider is a U.S. based company called Rackspace. They are the data centre of choice for some big names such as ANZ Bank, Virgin, Australia Post, Telstra, Rio Tinto, Village Roadshow and Xero to name a few. Rackspace offers hosting services to more than customers across nine data centres worldwide. They have 2600 employees (termed Rackers) and over 13 years of experience in the data centre hosting game. Make no mistake; this is a premium hosting solution. We have selected Hong Kong as a result of extensive testing. The country s location and carrier availability make it one of the safest places to host our cloud environment. Along with Australia, New Zealand, the U.S. and Canada, Hong Kong is also a signatory to an APEC Agreement on cross border privacy enforcement. Please see the following link for more detail: Arrangement.aspx In terms of physical infrastructure, let s say all of the physical cables (of which there are many) in Australia were cut off - we would still have redundant satellite connections to the outside world. Hong Kong and Hawaii are the two main hubs of the world s Internet traffic. Taking into account its closer proximity and better stability, we opted for Hong Kong. Chicago (Secondary Data Centre) In the Chicago data centre we have created an additional backup environment in case of a catastrophic physical failure in our primary data centre. Every night at 1am, the entire data centre is replicated to this secondary data centre. This means that in a worse case scenario we are able to fall back to the secondary backup and your data is safe as of 1am the previous night. 1.

4 What About Data Redundancy? Layer 1 Our private network in Hong Kong has multiple layers of redundancy. The front-end server that is used to host the primary system is replicated with a secondary or slave server in the background. This means that every time a transaction occurs on the database, the exact same transaction occurs on the secondary server. In the unlikely event of a problem occurring on the primary server, we can switch users to the secondary server without any loss of data. Layer 2 At 1am every night, all data in our primary data centre (including customisations, databases and attachments) is automatically uploaded and restored to the secondary data centre in Chicago. This ensures that in the event of a catastrophic failure in our primary data centre, we can fall back to the previous night s backup from the secondary data centre in the time it takes for DNS to update. Layer 3 Each night, databases and attachments are backed up on the Amazon S3 file storage solution. The Amazon S3 solution gives us an enterprise grade data backup solution that is replicated throughout the global Amazon network. Known as eventually persistent storage, once a backup is sent to the server, it s distributed throughout the network and available for use within seconds. 2.

5 Can You Explain More About Your Network? Essentially our primary data centre arrangement consists of three main hubs: Hong Kong, Chicago and Amazon. Behind the firewall in Hong Kong we have an array of front-end servers and slave servers. The slave servers then communicate with the Chicago and Amazon servers for mirroring and backups. The servers in the Australian data centre are essentially standalone servers without the redundancy and fault tolerance of the primary data centre. However, they do still backup amongst the other servers in the cluster. 3.

6 How Secure (Physically and Digitally) is the Data Centre? Our data centres are world-class facilities and SAS 70 accredited. SAS 70 accreditation stipulates no public access to the data centre floor at any time. Conversely, 90% of the data centres here in Australia are typical colocation arrangements, meaning that every customer has access to the server hall with only an individual cabinet separating devices. On a like-for-like basis, there are very few facilities in the world that can contend with our stringent security policies. The front-end of the private networks in our data centres are controlled with firewalls requiring multiple levels of authentication. Once initial access is gained, the servers then require additional authentication making the task of logging onto a server a three-stage authentication process. All databases are further protected with their own usernames and passwords. Using only Linux servers also makes us less prone to security exploits compared to other operating systems and ensures we have a stable, secure and reliable platform on which to deliver your software. 4.

White Paper The simpro Cloud

White Paper The simpro Cloud White Paper The simpro Cloud White Paper The simpro Cloud Executive Summary... 1 Cloud Overview... 1 Global Data Centre Network... 2 Cloud Architecture... 3 Primary Objectives... 3 Data Security... 4 Certification

More information

Enterprise level security, the Huddle way.

Enterprise level security, the Huddle way. Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network

More information

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0 DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,

More information

KeyLock Solutions Security and Privacy Protection Practices

KeyLock Solutions Security and Privacy Protection Practices KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout

More information

CLOUD INFRASTRUCTURE DESIGN GUIDE

CLOUD INFRASTRUCTURE DESIGN GUIDE CLOUD INFRASTRUCTURE DESIGN GUIDE WELCOME TO THE CLOUD INFRASTRUCTURE DESIGN GUIDE This guide illustrates various network configurations that can be designed using our cloud infrastructure. Typical scenarios

More information

Fully Managed Secure Data Sharing (a cloud service)

Fully Managed Secure Data Sharing (a cloud service) Protect your critical infrastructure, information & interactions Fully Managed Secure Data Sharing (a cloud service) working on behalf of What is Fully Managed Secure Data Share - FMSDS? Core Technology

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including

More information

Security from a customer s perspective. Halogen s approach to security

Security from a customer s perspective. Halogen s approach to security September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

REMOTE ASSISTANCE SOLUTIONS Private Server

REMOTE ASSISTANCE SOLUTIONS Private Server REMOTE ASSISTANCE SOLUTIONS Private Server UBIQUITY components Control Center: client on the remote assistance PC Ubiquity Runtime: software installed on the remote device Ubiquity Server Infrastructure:

More information

CLOUD FRAMEWORK & SECURITY OVERVIEW

CLOUD FRAMEWORK & SECURITY OVERVIEW CLOUD FRAMEWORK & OVERVIEW From small businesses to the largest Fortune 500 Enterprises, customers trust the irise cloud infrastructure when collaborating to define and design their applications. This

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including

More information

Cloud Management. Overview. Cloud Managed Networks

Cloud Management. Overview. Cloud Managed Networks Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course 20533A: Implementing Microsoft Azure Infrastructure Solutions Page 1 of 7 Implementing Microsoft Azure Infrastructure Solutions Course 20533A: 4 days; Instructor-Led Introduction This course is

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,

More information

FormFire Application and IT Security. White Paper

FormFire Application and IT Security. White Paper FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development

More information

Own your own Enterprise Cloud with. FlexCloud

Own your own Enterprise Cloud with. FlexCloud Own your own Enterprise Cloud with FlexCloud What Problem do we solve? Traditional Virtualization Stack Data protection software applications PDU Backup Servers + Virtualization Storage Switch HA shared

More information

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11 Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node

More information

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models 1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint

More information

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99% Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the

More information

Private Clouds & Hosted IT Solutions

Private Clouds & Hosted IT Solutions Private Clouds & Hosted IT Solutions Your Infrastructure, our datacenters With the help of its World-class partners, PBC can safely host any of your Mission-critical application on powerful, secure, Dedicated

More information

Our Cloud Offers You a Brighter Future

Our Cloud Offers You a Brighter Future Our Cloud Offers You a Brighter Future Qube Global Software Cloud Services are used by many diverse organisations including financial institutions, international service providers, property companies,

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

Server Virtualization with Windows Server Hyper-V and System Center

Server Virtualization with Windows Server Hyper-V and System Center Course 20409 : Server Virtualization with Windows Server Hyper-V and System Center Page 1 of 8 Server Virtualization with Windows Server Hyper-V and System Center Course 20409: 4 days; Instructor-Led Introduction

More information

DISASTER RECOVERY WITH AWS

DISASTER RECOVERY WITH AWS DISASTER RECOVERY WITH AWS Every company is vulnerable to a range of outages and disasters. From a common computer virus or network outage to a fire or flood these interruptions can wreak havoc on your

More information

Cloud Computing Disaster Recovery (DR)

Cloud Computing Disaster Recovery (DR) Cloud Computing Disaster Recovery (DR) Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Need for Disaster Recovery (DR) What happens when you

More information

CloudDesk - Security in the Cloud INFORMATION

CloudDesk - Security in the Cloud INFORMATION CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES

More information

The old Internet. Software in the Network: Outline. Traditional Design. 1) Basic Caching. The Arrival of Software (in the network)

The old Internet. Software in the Network: Outline. Traditional Design. 1) Basic Caching. The Arrival of Software (in the network) The old Software in the Network: What Happened and Where to Go Prof. Eric A. Brewer UC Berkeley Inktomi Corporation Local networks with local names and switches IP creates global namespace and links the

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

Local Area Network System

Local Area Network System N1 P.0 Hong Kong Certificate of Education Examination Computer and Information Technology Paper 3 : Coursework Report Local Area Network System Student ID : Date : N1 P.1 Content : I. Introduction 2 II.

More information

Solutions as a Service N.Konstantinidis Technical Director - MNG

Solutions as a Service N.Konstantinidis Technical Director - MNG Med Nautilus Greece Connected World April 10, 2014 Solutions as a Service N.Konstantinidis Technical Director - MNG MedNautilus Greece Solutions as a Service 2014 SINCE 2002 Data Center Physical Colocation

More information

Meeting Management Solution. Technology and Security Overview. 10012 N. Dale Mabry Hwy Suite 115 Tampa, FL 33618 800-274-5624 Ext 702

Meeting Management Solution. Technology and Security Overview. 10012 N. Dale Mabry Hwy Suite 115 Tampa, FL 33618 800-274-5624 Ext 702 Meeting Management Solution Technology and Security Overview 10012 N. Dale Mabry Hwy Suite 115 Tampa, FL 33618 800-274-5624 Ext 702 Technology SaaS Software as a Service is offered as well. Client may

More information

Unleashing the power of real-time collaboration:

Unleashing the power of real-time collaboration: Unleashing the power of real-time collaboration: Security overview of Cisco WebEx solutions Whitepaper Unleashing the power of real-time collaboration: Security overview of Cisco WebEx solutions. WebEx

More information

Epimorphics Linked Data Publishing Platform

Epimorphics Linked Data Publishing Platform Epimorphics Linked Data Publishing Platform Epimorphics Services for G-Cloud Version 1.2 15 th December 2014 Authors: Contributors: Review: Andy Seaborne, Martin Merry Dave Reynolds Epimorphics Ltd, 2013

More information

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Course 20533: Implementing Microsoft Azure Infrastructure Solutions Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Plan For Today, Grow Into Your Future.

Plan For Today, Grow Into Your Future. One Partner, Endless Capabilities. Since 2001, UL has helped organizations grow from Colo to Cloud San Francisco Los Angeles Las Vegas Toronto Virginia Vancouver Plan For Today, Grow Into Your Future.

More information

My Services Online Service Support. User Guide for DNS and NTP services

My Services Online Service Support. User Guide for DNS and NTP services My Services Online Service Support User Guide for DNS and NTP services Table of Contents 1 MY SERVICES... 3 2 ACCESSING MY SERVICES VIA THE INTERNET... 3 2.1 Logging into My Services... 3 2.2 My Services

More information

Cisco Network Switches Juniper Firewall Clusters

Cisco Network Switches Juniper Firewall Clusters Cisco Network Switches Juniper Firewall Clusters Cisco Network Infrastructure Cisco Network Infrastructure Core Network Consists of 4 Cisco 4506 switches 10 Gig E Fiber Optic Connections between switches

More information

Web Hosting Recommendation Report

Web Hosting Recommendation Report Web Hosting Recommendation Report Design / Develop/ Build/ Two Hosting Systems Evaluate and Select Web Hosting Services for two Clients with distinct Business Requirements. EYE Design Page number 1 Contents

More information

TalentLink Disaster Recovery & Service Continuity

TalentLink Disaster Recovery & Service Continuity Technical Services Briefing Document TalentLink Disaster Recovery & Service Continuity Version 1.2 (January 2012) Contents Overview Planning for Service Continuity Disaster Recovery Process Business Continuity

More information

Website Disaster Recovery

Website Disaster Recovery Website Disaster Recovery Contents Overview... 2 Disaster Preparedness for the Internet Age... 2 Some Fundamental Questions... 2 Planning Your Recovery... 3 Start with a Backup Plan... 4 Backup Commandments...

More information

Perceptive Software Platform Services

Perceptive Software Platform Services Perceptive Software Platform Services CLOUD SOLUTIONS process and content management Perceptive Software Platform Services Perceptive Software process and content management systems have been deployed

More information

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests.

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests. THE BRIGHTIDEA CLOUD INFRASTRUCTURE INTRODUCTION Brightidea s world-class cloud infrastructure is designed and certified to handle the most stringent security, reliability, scalability, and performance

More information

SysAid Cloud Architecture Including Security and Disaster Recovery Plan

SysAid Cloud Architecture Including Security and Disaster Recovery Plan SysAid Cloud Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid Cloud: Datacenters Network, Hardware, and Software Components Disaster Recovery Plan

More information

High Availability and Clustering

High Availability and Clustering High Availability and Clustering AdvOSS-HA is a software application that enables High Availability and Clustering; a critical requirement for any carrier grade solution. It implements multiple redundancy

More information

Creating A Highly Available Database Solution

Creating A Highly Available Database Solution WHITE PAPER Creating A Highly Available Database Solution Advantage Database Server and High Availability TABLE OF CONTENTS 1 Introduction 1 High Availability 2 High Availability Hardware Requirements

More information

Implementing Failover Capabilities in Red Hat Network Satellite

Implementing Failover Capabilities in Red Hat Network Satellite Implementing Failover Capabilities in Red Hat Network Satellite By Vladimir Zlatkin Abstract This document will help you create two identical Red Hat Network (RHN) Satellites functioning in failover mode.

More information

The Definitive Guide to Cloud Acceleration

The Definitive Guide to Cloud Acceleration The Definitive Guide to Cloud Acceleration Dan Sullivan sponsored by Chapter 5: Architecture of Clouds and Content Delivery... 80 Public Cloud Providers and Virtualized IT Infrastructure... 80 Essential

More information

SQL Server Mirroring. Introduction. Setting up the databases for Mirroring

SQL Server Mirroring. Introduction. Setting up the databases for Mirroring SQL Server Mirroring The purpose of this document is to describe in detail the process of configuring Secret Server and SQL Server 2008 for a high-availability environment using Mirroring. The contents

More information

SaaS Security for the Confirmit CustomerSat Software

SaaS Security for the Confirmit CustomerSat Software SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture

More information

Fact Sheet FOR PHARMA & LIFE SCIENCES

Fact Sheet FOR PHARMA & LIFE SCIENCES Fact Sheet PATHWAY STUDIO WEB SECURITY OVERVIEW Pathway Studio Web is a comprehensive collection of information with powerful security features to ensure that your research is safe and secure. FOR PHARMA

More information

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid IT On-Demand: Architecture Security Business Continuity and Disaster Recovery

More information

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently

More information

NET ACCESS VOICE PRIVATE CLOUD

NET ACCESS VOICE PRIVATE CLOUD Page 0 2015 SOLUTION BRIEF NET ACCESS VOICE PRIVATE CLOUD A Cloud and Connectivity Solution for Hosted Voice Applications NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of

More information

InterCall Streaming Services Security Planning and Testing

InterCall Streaming Services Security Planning and Testing InterCall Streaming Services Security Planning and Testing In the U.S.: 800.374.2441 www.intercall.com [email protected] In Canada: 877.333.2666 www.intercall.ca Application InterCall Streaming Services

More information

data center - why choose a data center facility

data center - why choose a data center facility data center - why choose a data center facility Do you have the highest levels of security, redundancy, reliability, infrastructure and technical expertise necessary to operate your Internet operations?

More information

StratusLIVE for Fundraisers Cloud Operations

StratusLIVE for Fundraisers Cloud Operations 6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace

More information

penelope athena software SOFTWARE AS A SERVICE INFORMATION PACKAGE case management software

penelope athena software SOFTWARE AS A SERVICE INFORMATION PACKAGE case management software penelope case management software SOFTWARE AS A SERVICE INFORMATION PACKAGE athena software "I've worked with major corporations and universities and I am really impressed with Athena's hosted server and

More information

Advanced High. Architecture. www.service-now.com

Advanced High. Architecture. www.service-now.com Advanced High Availability Architecture www.service-now.com Advanced High Availability Architecture WHITE PAPER Advanced High Availability Architecture Overview This document describes the ServiceNow Advanced

More information

DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD

DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD Configuring the BIG-IP LTM system for use with FirePass controllers Welcome to the Configuring

More information

Availability and Disaster Recovery: Basic Principles

Availability and Disaster Recovery: Basic Principles Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer

More information

Asia-Pacific Datacenter Services Market 2010 New Contenders Emerging on the Horizon

Asia-Pacific Datacenter Services Market 2010 New Contenders Emerging on the Horizon Asia-Pacific Datacenter Services Market 2010 New Contenders Emerging on the Horizon June 2012 Contents Section Slide Numbers Executive Summary 4 Market Overview 10 Australian Datacenter Services Market

More information

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013. Deployment Guide

Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013. Deployment Guide Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013 Deployment Guide rev. 1.4.2 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Appliances

More information

Security, trust and assurance

Security, trust and assurance Data sheet Security, trust and assurance A closer look at Projectplace safeguards Security: Projectplace protects every bit of your data Trust: Privacy is not dead at Projectplace, your data is yours Assurance:

More information

Security Whitepaper: ivvy Products

Security Whitepaper: ivvy Products Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security

More information

City of Dublin Education & Training Board. Programme Module for. Information Technology Administration. leading to. Level 6 QQI

City of Dublin Education & Training Board. Programme Module for. Information Technology Administration. leading to. Level 6 QQI City of Dublin Education & Training Board Programme Module for Information Technology Administration leading to Level 6 QQI Version 3 1 Introduction This programme module may be delivered as a standalone

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

Product Overview. UNIFIED COMPUTING Managed Hosting - Storage Data Sheet

Product Overview. UNIFIED COMPUTING Managed Hosting - Storage Data Sheet Product Overview Interoute offers a range of managed storage solutions to provide the best fit for our customers budget, capacity, performance and compliance needs. By taking advantage of our unrivalled

More information

Storage and Disaster Recovery

Storage and Disaster Recovery Storage and Disaster Recovery Matt Tavis Principal Solutions Architect The Business Continuity Continuum High Data Backup Disaster Recovery High, Storage Backup and Disaster Recovery form a continuum of

More information

Capability Statement GO

Capability Statement GO GO Capability Statement From the ground to the cloud, we provide integrated digital solutions for government, corporate customers and telecommunications carriers. WHAT WE DO Nextgen Group is a leading

More information

Technical specifications

Technical specifications Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.

More information

Pacnet Hong Kong CloudSpace2 Technical Specifications. Upholding the Principles of Efficiency and Sustainability in Data Center Design

Pacnet Hong Kong CloudSpace2 Technical Specifications. Upholding the Principles of Efficiency and Sustainability in Data Center Design POWERING A CONNECTED ASIA Pacnet Hong Kong CloudSpace2 Technical Specifications Upholding the Principles of Efficiency and Sustainability in Data Center Design Our purpose-built, 5,000 m 2 Pacnet Hong

More information

CHOOSING A RACKSPACE HOSTING PLATFORM

CHOOSING A RACKSPACE HOSTING PLATFORM CHOOSING A RACKSPACE HOSTING PLATFORM Rackspace has years of experience in hosting and has learnt that the unique needs of our customers businesses often determines the level of accountability and project

More information

HealthLink Security Policy

HealthLink Security Policy HealthLink Security Policy Updated 21 st July 2014 HealthLink commercial in confidence 11/03/2014 HealthLink 0 Date First Version 2nd October 2001 Date Last Change 21 st July 2014 Document Name HealthLink

More information

Security & Infrastructure White Paper

Security & Infrastructure White Paper Proofing and approval made easy. Security & Infrastructure White Paper ProofHQ (Approvr Limited) 66 The High Street Northwood Middlesex HA6 1BL United Kingdom Email: [email protected] US: +1 214 519

More information

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R

More information

Table of Contents. Overview... 1 Introduction... 2 Common Architectures... 3. Technical Challenges with Magento... 6. ChinaNetCloud's Experience...

Table of Contents. Overview... 1 Introduction... 2 Common Architectures... 3. Technical Challenges with Magento... 6. ChinaNetCloud's Experience... Table of Contents Overview... 1 Introduction... 2 Common Architectures... 3 Simple System... 3 Highly Available System... 4 Large Scale High-Performance System... 5 Technical Challenges with Magento...

More information

POWERING A CONNECTED ASIA. Pacnet Hong Kong CloudSpace1 Technical Specifications. Asia s Pioneering Facility with Direct Subsea Cable Access

POWERING A CONNECTED ASIA. Pacnet Hong Kong CloudSpace1 Technical Specifications. Asia s Pioneering Facility with Direct Subsea Cable Access POWERING A CONNECTED ASIA Pacnet Hong Kong CloudSpace1 Technical Specifications Asia s Pioneering Facility with Direct Subsea Cable Access Our purpose-built, 300 m 2 Pacnet Hong Kong CloudSpace1 (HKCS1)

More information

Using AWS in the context of Australian Privacy Considerations October 2015

Using AWS in the context of Australian Privacy Considerations October 2015 Using AWS in the context of Australian Privacy Considerations October 2015 (Please consult https://aws.amazon.com/compliance/aws-whitepapers/for the latest version of this paper) Page 1 of 13 Overview

More information

PROMAPP TECHNICAL INFORMATION

PROMAPP TECHNICAL INFORMATION Promapp Software Architecture Promapp is designed in accordance with Microsoft best practices, developed with the Microsoft.net framework and uses a Microsoft SQL database. The software architecture is

More information