MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview
|
|
|
- Juliana Melton
- 10 years ago
- Views:
Transcription
1 MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide logistical information. The hosting facility is owned and operated by ViaWest, an experienced and trusted, super-regional provider of co-location, managed hosting and business continuity solutions. Documentation covered in this disclosure includes the following: Hosting Structure (Redundancy & Load Balancing) Network and Hardware Redundancy Backup and Recovery UPS Systems Security Policy Monitoring (Alerts & Logs) Systems Hosting Facility Overview ViaWest designed data centers are built with multiple fiber and circuit entrances providing redundancy at the physical layer. These entrance facilities meet and/or exceed Bellcore standards for diverse entrances and physical separation. Multiple Cores ViaWest data centers are designed with multiple core routers, allowing ViaWest to expand its network with little to no impact to customers Multiple Switches Failure in the aggregation layer is minimized with redundant devices also directly interconnected and each having a connection to a core router. ViaWest also offers redundant connections through unique distribution switches. Logical Redundancy ViaWest s backbone routers run an Open Shortest Path First (OSPF) protocol to determine the best path from one location to the other. If a circuit or device fails for any reason, each router automatically calculates the newest best path to forward traffic minimizing any impact a customer may experience. 1
2 Physical Diversity ViaWest has four data centers throughout the Rocky Mountain region, each containing a specified amount of redundancy and mirroring of operations across all data centers. Network Redundancy ViaWest data centers are connected through a packet over sonnet fiber ring utilizing redundant circuits from various providers Backup and Recovery The following disaster recovery services are provided: 1. Data Storage Data is regularly backed up and tapes are rotated to an offsite, fire-safe vault further ensuring if the main facility goes down, a back-up can be located off-site. 2. Load Balancing Web sites and data are run from two or more servers using a load balancer to route traffic between separate instances on different servers. In the event of a problem with a server, the load can be transferred to the remaining servers, with little or no disruption to service or loss of data. 3. Clustering Multiple servers are used as part of a single, clustered system. If one machine fails, the remaining servers will automatically redistribute the load, keeping services intact. Maintaining/Restoring Business Operations Each of the ViaWest Network Operations Center's is independent of the other and is capable of monitoring and maintaining all of the ViaWest network and infrastructure independent of the other. If data recovery is required to resume normal business operations, remote copies of all critical data are stored off-site and can be used to restore operating systems, production data, databases, configurations and other records as needed. Critical data is maintained online at multiple locations and can be retrieved through the network to restore local copies. UPS Systems In each location, multiple UPS systems are available to provide redundant power to the critical load. All locations have at least two UPS s deployed in an N+1 configuration that customers may take advantage of by having power from each UPS delivered to their equipment. In ViaWest facilities where power is run under the raised floor, all electrical cabling used is constructed of waterproof materials and is located off the floor so it will not be impacted by water or flooding. In addition, water sensors are located under the raised floors which will immediately notify local and remote personnel of the presence of liquid under the floor. HVAC Each ViaWest Data Center is equipped with multiple independent condenser/air-cooled and dry cooler/glycol/water-cooled Heating, Ventilation, and Air Conditioning (HVAC) systems to minimize the single point of failure common in chiller-based systems. All ViaWest data centers are on raised floors and incorporate down flow air handlers for maximum cooling flexibility. Down flow systems feed cool air to the critical loads through perforated tiles in the raised floor and return warm air through filtration systems at the top of the air handler units. 2
3 Fire Detection and Suppression ViaWest incorporates dual-zone, two-stage fire detection systems in all of its facilities. A dual-zone system minimizes the possibility of a false alarm indication by having each detector installed in a different zone than its nearest neighbors. Physical Security All persons who have authorized access to any ViaWest facility are issued photo ID/access cards. All access badges have different formats designating their security level. Each card is individually serialized and all entries to facilities are electronically logged. Monitoring (Alerts & Logs) Each critical environmental system is individually monitored for correct operation. If any system fails its internal diagnostics, reports an error, or falls out of its nominal operating range, that symptom is immediately reported through an out-of-band connection to a remote monitoring station that will immediately dispatch the appropriate field service technician to the site where the potential problem is occurring. 1. Monitoring Alerts An notification is sent whenever the NOC detects a service interruption (HTTP, MySQL, SMTP, etc) 2. Backup Alerts An automatic is triggered whenever any errors are detected in nightly data backups 3. Application Event Notifications Our applications rely on several timed processes, or "cron jobs", which send diagnostic information regularly about all of our web applications. For example, if a site template is pushed to production, or if there's an error subscribing someone to an list. 3
4 Server Infrastructure and Architecture Firewall Protection ViaWest uses industry leading firewall hardware to protect all applications and data. External and internal traffic is monitored continually by the company s system security administrators. All back-office systems are protected using standard SSL (Secure Socket Layer). Firewall Configuration: NetScreen: managed by ViaWest security experts, our facility has two firewalls configured in High Availability mode. This allows the complete loss of one firewall and a seamless transition of traffic to the secondary firewall. Network Routers, Switches and Servers All routers, switches and servers are kept in physically secure areas. Access to these secured areas is restricted to a select number of individuals. A current topology of the network is maintained and updated as new hardware and port assignments are made. Network Intrusion Detection and Prevention ViaWest partners with the leading authority of Internet security in implementing security tool that allow us to secure our systems by monitoring the network and servers for signs indicating possible attacks. The ViaWest firewall and data network configurations are maintained at strict levels of security. Each external network port is configured according to internal guidelines and is monitored routinely. Denial of Service (DoS) and Distributed Denial of Service Attacks (DDos) ViaWest s strategy to combat DoS and DDos attacks is a multi-faceted approach that includes detection, tracing and isolation of the network abuse events. The ViaWest policy is to act before other customers may be impacted. The NOC is equipped to monitor any alerts, allowing appropriate changes to be made, mitigating the affects of attack. ViaWest has working relationships and direct security contacts with all major network providers. ViaWest actively monitors and participates in security and Computer Emergency Response Teams (CERT) related communities and mailing lists. 4
5 Web Solution Infrastructure and Architecture All Web solutions are built using our proprietary SPIN platform. Documentation covered in this disclosure includes the following: Database Requirements Software Specs (SPIN Configuration) Caching Database Requirements A site/application built on the proprietary SPIN platform has very simple database requirements: A single MySQL database A single MySQL user with INSERT, UPDATE, SELECT, and DELETE privileges on that database SPIN has currently been tested on versions of MySQL up to MySQL 5. Current System Requirements are as follows: RedHat Enterprise ES 3 (though any Linux should be fine) Apache 2.0 (1.3 is fine) MySQL standard Configuration We utilize Web Servers behind a redundant load balancer. The Database Server's use MySQL 5 Cluster, a real-time transactional database designed for fast, always-on access to data under high throughput conditions. MySQL Cluster utilizes a shared nothing architecture which does not require any additional infrastructure. The servers are dedicated; eliminating constraints that shared services has with CPU/RAM hogging. Our current average utilization is 15% - 30% of this capacity. Database Server DB-EdgeServer 200 Red Hat Linux ES Dedicated Server Intel Quad Core Xeon Processor Red Hat Linux ES OS Server license 24 x 7 on-site monitoring with event notification and ticket generation 24 x 7 on-site hardware management Local hardware sparing Web Application Server Web AppServer 300 Red Hat Linux ES Dedicated Server Intel Dual Core Xeon Processor Red Hat Linux ES OS Server license 24 x 7 on-site monitoring with event notification and ticket generation 24 x 7 on-site hardware management Local hardware sparing 5
6 Caching Our Web products use server side caching of complete HTML pages. The benefit is to reduce repetitive queries to the database, which can dramatically increase the performance on a busy site. When a page is edited in Site Manager, the complete site cache is flushed. We are not aware of any limitations in our caching setup including memory or disk limitations. A site's cache directory has enough available disk space to support writing all pages of a site to this directory, but this should not be significant. A page is "published" (in real time) when editing the given page with the Site Manager and clicking 'Save'. A page is written to the Server Side cache directory when the first user accesses that page. 6
DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0
DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
Altus UC Security Overview
Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Security & Infrastructure White Paper
Proofing and approval made easy. Security & Infrastructure White Paper ProofHQ (Approvr Limited) 66 The High Street Northwood Middlesex HA6 1BL United Kingdom Email: [email protected] US: +1 214 519
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
Mule Enterprise Service Bus (ESB) Hosting
Enterprise web solutions G7 Service Definition Mule Enterprise Service Bus (ESB) Hosting t: 0845 519 5465 e: [email protected] w: www.axistwelve.com Page 1 of 7 Table of contents Overview... 3 Service...
IT Security Standard: Network Device Configuration and Management
IT Security Standard: Network Device Configuration and Management Introduction This standard defines the steps needed to implement Bellevue College policy # 5250: Information Technology (IT) Security regarding
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
Troubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
Private Clouds & Hosted IT Solutions
Private Clouds & Hosted IT Solutions Your Infrastructure, our datacenters With the help of its World-class partners, PBC can safely host any of your Mission-critical application on powerful, secure, Dedicated
Applications Manager Best Practices document
Applications Manager Best Practices document This document will list the AdventNet ManageEngine Applications Manager best practices 1. Hardware and Software requirements 2. Configuring Applications Manager
StratusLIVE for Fundraisers Cloud Operations
6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace
SERVICE LEVEL AGREEMENT
SERVICE LEVEL AGREEMENT This service level agreement ( SLA ) is incorporated into the master services agreement ( MSA ) and applies to all services delivered to customers. This SLA does not apply to the
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
Service Agreement - Dynamic Cloudv4
Service Agreement - Dynamic Cloudv4 Service Agreement Dynamic Cloudv4 Between Customer details Company name Street Number Box Postal code Locatlity Country VAT RLP locality Hereinafter referred to as the
Automating Infrastructure A connectivity perspective for BICSI SEA meeting, November 2011
Automating Infrastructure A connectivity perspective for BICSI SEA meeting, November 2011 Opportunities in Automating Infrastructure Why Automation in Data Center? Tiers, compartments and complexity Work
Level I - Public. Technical Portfolio. Revised: July 2015
Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center
HRG Assessment: Stratus everrun Enterprise
HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at
Blackboard Managed Hosting SM Disaster Recovery Planning Document
BLACKBOARD MANAGED HOSTING Blackboard Managed Hosting SM Disaster Recovery Planning Document Prepared By: MH Services Modified Date: March 2009 Revision: 1.8 1. OBJECTIVES... 3 2. SCOPE... 3 3. ASSUMPTIONS...
Data Center Infrastructure & Managed Services Outline
Data Center Infrastructure & Managed Services Outline The 360 Technology Center Solutions Data Center is located in Lombard, IL, USA. We are 20 minutes outside of downtown Chicago. The 360TCS staff consists
Service Agreement Telenet Dynamic Cloud
Service Agreement Telenet Dynamic Cloud Between Customer details Company name Street Number Box Postal code Locality Country VAT RLP locality Hereinafter referred to as the Customer and Telenet details
ONMSi: Optical Network Monitoring System. Fiber Network Visibility that Scales for Both PON and Point-to-Point Networks
ONMSi: Optical Network Monitoring System Fiber Network Visibility that Scales for Both PON and Point-to-Point Networks y Drastically reduce network downtime y Improve network reliability and SLA management
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists
Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview
GiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
Powerful Dedicated Servers
Powerful Dedicated Servers Our dedicated servers offer outstanding performance for even the most demanding of websites with the latest Intel & Dell technology combining unparalleled server specification,
ONMSi: Optical Network Monitoring System
ONMSi: Optical Network Monitoring System Fiber network visibility that scales for both PON and point-to-point networks Drastically reduce network downtime Improve network reliability and SLA management
Injazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
out of this world guide to: POWERFUL DEDICATED SERVERS
out of this world guide to: POWERFUL DEDICATED SERVERS Our dedicated servers offer outstanding performance for even the most demanding of websites with the latest Intel & Dell technology combining unparalleled
System i and System p. Customer service, support, and troubleshooting
System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,
DATA CENTRE DATA CENTRE MAY 2015
DATA CENTRE DATA CENTRE MAY 2015 CONCERTHOUSE MUSIC Concerthouse Music Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level
Security Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
SERVICE SCHEDULE DEDICATED SERVER SERVICES
SERVICE SCHEDULE DEDICATED SERVER SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a
How To Use Onmsi For Fiber Optic Network Monitoring System
ONMSi: Optical Network Monitoring System Fiber network visibility that scales for both PON and point-to-point networks Drastically reduce network downtime Improve network reliability and SLA management
Managing your Red Hat Enterprise Linux guests with RHN Satellite
Managing your Red Hat Enterprise Linux guests with RHN Satellite Matthew Davis, Level 1 Production Support Manager, Red Hat Brad Hinson, Sr. Support Engineer Lead System z, Red Hat Mark Spencer, Sr. Solutions
Webrecs IT infrastructure. The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you
Webrecs IT infrastructure The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you Sunday, April 21, 2013 Contents Introduction... 3 Data storage... 3 Data Centres...
Service Description CloudSure Public, Private & Hybrid Cloud
Service Description CloudSure Public, Private & Hybrid Cloud Table of Contents Overview - CloudSure... 3 CloudSure Benefits... 3 CloudSure Features... 3 Technical Features... 4 Cloud Control... 4 Storage...
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document
Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.
Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:
Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described
North Street Global, LLC. Business Continuity Plan
Overview North Street Global, LLC. Business Continuity Plan North Street Global holds business continuity for disaster recovery as a high priority. Our goal is to ensure our continued ability to serve
Hosting Solutions Made Simple. Managed Services - Overview and Pricing
Hosting Solutions Made Simple Managed Services - Overview and Pricing NETRACKservers Internet Security Package: NETRACKservers's Internet Security Package is an ideal security service for business that
CHOOSING A RACKSPACE HOSTING PLATFORM
CHOOSING A RACKSPACE HOSTING PLATFORM Rackspace has years of experience in hosting and has learnt that the unique needs of our customers businesses often determines the level of accountability and project
Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING
Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Application of Terms Agreement to these terms requires agreement to Web Drive s Standard Terms & Conditions located online at the
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
KeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
FatPipe Networks www.fatpipeinc.com
WARP WHITE PAPERS FatPipe WARP Reliability, Redundancy and Speed of Bi-directional IP Traffic The implementation of mission critical applications run over wide area networks as a basic communication tool
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
Perceptive Software Platform Services
Perceptive Software Platform Services CLOUD SOLUTIONS process and content management Perceptive Software Platform Services Perceptive Software process and content management systems have been deployed
AppDirector Load balancing IBM Websphere and AppXcel
TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT
Network Management System (NMS) FAQ
Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes
Ignify ecommerce. Item Requirements Notes
wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor
RL Solutions Hosting Service Level Agreement
RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The
Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview
Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R
Cisco Network Switches Juniper Firewall Clusters
Cisco Network Switches Juniper Firewall Clusters Cisco Network Infrastructure Cisco Network Infrastructure Core Network Consists of 4 Cisco 4506 switches 10 Gig E Fiber Optic Connections between switches
Unlimited Server 24/7/365 Support
Unlimited Server 24/7/365 Support Unlimited Server Support from System Architects covers your Windows servers, Linux servers and virtual machines. Your servers are monitored and managed 24 hours a day,
WAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
Report of Independent Auditors
Ernst & Young LLP Suite 3300 370 17th Street Denver, Colorado 80202-5663 Tel: +1 720 931 4000 Fax: +1 720 931 4444 www.ey.com Report of Independent Auditors To the Management of NTT America, Inc.: We have
CloudSure Managed IaaS
CloudSure Managed IaaS Contents Contents... 1 Overview - CloudSure... 3 CloudSure Benefits... 3 CloudSure Features... 3 Technical Features... 4 Cloud Control... 4 Storage... 4 Data Location and Integrity...
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Understanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
112 Linton House 164-180 Union Street London SE1 0LH T: 020 7960 5111 F: 020 7960 5100
112 Linton House 164-180 Union Street London SE1 0LH T: 020 7960 5111 F: 020 7960 5100 Our dedicated servers offer outstanding performance for even the most demanding of websites with the low monthly fee.
Aljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: June 16, 2009
Business Continuity & Disaster Recovery Plan Last Updated: June 16, 2009 Business Continuity & Disaster Recovery Plan Page 2 of 6 Table of Contents Introduction... 3 Business Continuity... 3 Employee Structure...
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Cisco Application Networking Manager Version 2.0
Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment
The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1
Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4
redcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
Microsoft Hyper-V Powered by Rackspace & Microsoft Cloud Platform Powered by Rackspace Support Services Terms & Conditions
Microsoft Hyper-V Powered by Rackspace & Microsoft Cloud Platform Powered by Rackspace Support Services Terms & Conditions Your use of the Microsoft Hyper-V Powered by Rackspace or Microsoft Cloud Platform
Colocation Hosting Primer Making the Business and IT Case for Colocation
Where every interation matters. Colocation Hosting Primer Making the Business and IT Case for Colocation White Paper February 2012 By: Peer 1 Hosting Product Team www.peer1.com Contents Overview 3 Why
Availability and Disaster Recovery: Basic Principles
Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer
Virtual Server and Storage Provisioning Service. Service Description
RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...
An Oracle White Paper May 2013. Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices
An Oracle White Paper May 2013 Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices Introduction... 1 Component Overview... 2 Sizing Hardware Requirements... 3 Audit Vault Server Sizing...
Module 5 Introduction to Processes and Controls
IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development
OKHAHLAMBA LOCAL MUNICIPALITY
OKHAHLAMBA LOCAL MUNICIPALITY I.T DISASTER RECOVERY PLAN 2012/2013 TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 PURPOSE 2 1.2 OBJECTIVES 2 1.3 SCOPE 2 1.4 DISASTER RECOVERY STRATEGY 2 1.5 DISASTER DEFINITION
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
SAN TECHNICAL - DETAILS/ SPECIFICATIONS
SAN TECHNICAL - DETAILS/ SPECIFICATIONS Technical Details / Specifications for 25 -TB Usable capacity SAN Solution Item 1) SAN STORAGE HARDWARE : One No. S.N. Features Description Technical Compliance
NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.
NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result
Quality Certificate for Kaspersky DDoS Prevention Software
Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General
hong kong//china data center specifications tel: +61 2 9948 8888 fax: +61 2 9948 1111 internet + intellectual property + intelligence
internet + intellectual property + intelligence We thank you for the opportunity to work with you regarding your colocation needs in Hong Kong, China. We can colocate standard rack-mountable servers or
