Troux Hosting Options



Similar documents
Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Secure, Scalable and Reliable Cloud Analytics from FusionOps

GiftWrap 4.0 Security FAQ

Birst Security and Reliability

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Enterprise level security, the Huddle way.

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

Five keys to a more secure data environment

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations

October P Xerox App Studio. Information Assurance Disclosure. Version 2.0

Copyright

StratusLIVE for Fundraisers Cloud Operations

PowerVCS and Security

Securing the Service Desk in the Cloud

IBX Business Network Platform Information Security Controls Document Classification [Public]

Description of Hosted Services Security

A Decision Maker s Guide to Securing an IT Infrastructure

Security & Infra-Structure Overview

Security Controls for the Autodesk 360 Managed Services

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

SERENA SOFTWARE Serena Service Manager Security

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL

The Dangers of Consumer Grade File Sharing in a Compliance Driven World

December P Xerox App Studio 3.0 Information Assurance Disclosure

Private vs. Public Cloud Solutions

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

Private Cloud Hosting

White Paper How Noah Mobile uses Microsoft Azure Core Services

OPEN FOR EDUCATION. CampusNet - Managed Hosting services for Higher Education

Managed Hosting Evaluating Blackboard Managed Hosting Vs. Self Hosting

Security from a customer s perspective. Halogen s approach to security

SaaS Security for the Confirmit CustomerSat Software

Cisco Advanced Services for Network Security

How Much is the Sky? Cloud Services Reduce Costs. White Paper. Evaluating the Monetary Aspects of Moving to the Cloud

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

owncloud Architecture Overview

Table of Contents. Page 1 of 6 (Last updated 30 July 2015)

SOLUTIONS. Secure Infrastructure as a Service for Production Workloads

White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications

Hosted SharePoint: Questions every provider should answer

White Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC.

HIPAA Compliant Infrastructure Services. Real Security Outcomes. Delivered.

Two-Factor Authentication

FormFire Application and IT Security. White Paper

BMC s Security Strategy for ITSM in the SaaS Environment

White Paper Secure Reverse Proxy Server and Web Application Firewall

Security, trust and assurance

Moving to the Cloud? DIY VS. MANAGED HOSTING

Family Datasheet AEP Series A

SaaS architecture security

Cloud Hosting. Quick Guide 7/30/ EarthLink. Trademarks are property of their respective owners. All rights reserved.

Fujitsu Cloud IaaS Trusted Public S5. shaping tomorrow with you

The Power of the Unica Marketing Platform

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Cloud Security: An Independent Assessent

DriveHQ Security Overview

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

PCI Requirements Coverage Summary Table

BMC Remedy OnDemand. Product Overview

NCR CLOUD SERVICES OVERVIEW. An NCR Brochure

Is Cloud-Based WMS an Option for Complex Distribution Centers?

Tenzing Security Services and Best Practices

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

How To Secure An Rsa Authentication Agent

Firewall Administration and Management

SOFTWARE AS A SERVICE (SaaS)

security in the cloud White Paper Series

White Paper: Librestream Security Overview

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan

White Paper. BD Assurity Linc Software Security. Overview

ProjectManager.com Security White Paper

Private Clouds & Hosted IT Solutions

Level I - Public. Technical Portfolio. Revised: July 2015

Healthcare Security and HIPAA Compliance with A10

Hybrid Cloud. How Businesses should be incorporating Hybrid Cloud as part of their Core IT Strategy

Accellion Security FAQ

Security Overview Enterprise-Class Secure Mobile File Sharing

CHOOSING A RACKSPACE HOSTING PLATFORM

BOWMAN SYSTEMS SECURING CLIENT DATA

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

PRODUCT SHEET: CA Arcot Cloud Services Data Centers CA Arcot cloud services data centers. True multi-tenancy and scalability

Securing Enterprise Mobility for Greater Competitive Advantage

Cloud Hosting Option For New OnSite Customers

Computing: Public, Private, and Hybrid. You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds.

EmpLive Technical Overview

CA Cloud Overview Benefits of the Hyper-V Cloud

Managed Security Services for Data

Altus UC Security Overview

Ensuring the Security of Your Company s Data & Identities. a best practices guide

GTS Software Pty Ltd. Remote Desktop Services

Cloud Contact Center. Security White Paper

Managed & Professional Services

Transcription:

Troux Hosting Options

Introducing Troux Hosting Options Benefits of a Hosted Troux Environment...3 Convenience...3 Time-to-Value...3 Reduced Cost of Ownership...3 Scalability and Flexibility...3 Security...4 Reliability...4 Expertise...4 Choosing the Right Hosting Option for You...5 Cloud Hosting...5 Dedicated Hosting...5 On Demand...5 Configuration and Connection Options...6 Connecting to Other Systems...6 Single Sign-On Integration...6 Report Configuration...6 Additional Configurations...6 Upgrades...6 Flexible Hosted Architecture...7 Built on the World s Largest Hosted Infrastructure...7 Security Overview...8 Physical Security...8 Operational Security...8 Infrastructure Security...8 Administration and Support...9 Administration...9 Development and Testing...9 Support...9 service overview 2

Benefits of a Hosted Troux Environment Troux s market-leading solutions are now available as hosted options, opening up a range of added benefits to Troux customers. Convenience Your goals are business related and you don t have the time or money to install and maintain IT infrastructure. Nor do you want to wait for approvals and funding to get somebody else to do it. With Troux s hosting options, all your system setup and maintenance is taken care of so you just login and go. Figure 1: Troux applications - ready to use Time-to-Value Every day saved in setting up your applications is an extra day that you can be delivering business value. And every day really counts with Troux. Its applications have been independently assessed as delivering over 700% ROI. Use Troux s Accelerator approach in conjunction with hosting to further speed value delivery. In most cases, a new system can be up and running within days of initial order. Reduced Cost of Ownership With Troux s hosted options, you don t need to pay for any additional hardware, software or storage or the resources to maintain them. We take care of all the administration and operation of the hardware and software. Our hosting fees are extremely competitive and deliver a strong ROI when compared to purchasing and managing internal equipment, in addition to training and managing staff. Scalability and Flexibility As your use of Troux evolves, you ll want to share its use to thousands of users with your organization. Troux s hosting options allow you to add new users rapidly or handle peak demands without having to wait for upgraded infrastructure. Troux s hosting options also support custom client configurations, such as unique interfaces, reporting, processes, or information security requirements. Troux consultants are on hand to advise you of your configuration and upgrade options. service overview 3

Security Troux is used by some of the world s largest and most competitive companies as well as most major government agencies - where information and user security is paramount. Troux has partnered with Rackspace the leading global provider of managed hosting and cloud services and by using Rackspace s extensive security and management expertise, Troux provides a multi-layered approach to security: Physical Security. We lock down and log all physical access to servers at our datacenter. Operational Security. Our business processes follow security best practices to limit access to confidential information and maintain tight security over time. System Security. We lock down customer systems from the inside, starting with hardened operating systems and up-to-date patching. For more details on these security aspects, please see the security section later in this paper. Reliability Troux hosting options use the advanced System Management demanded by the world s leading companies, including: 24x7x365 operation Extensive monitoring Encrypted offsite backups Oracle 11g database RAID-based storage Expertise Troux has more expertise than anyone in managing and administering Troux implementations. Let the experts from Troux take care of all the tasks that require expensive operational experts, and reduce training costs and time for your staff. Troux uses best practices for all phases of system configuration and operation, maximizing uptime and delivering business value more quickly. You can focus on business impact and let Troux handle all the rest. service overview 4

Choosing the Right Hosting Option for You Troux provides three hosting options suited to the needs of different organizations. Cloud Hosting Dedicated Hosting On Demand Software Licenses Perpetual Perpetual Rented Infrastructure Shared Dedicated Shared Hosting Cost Low High Low Software Cost 1 Low Low High Cloud Hosting With cloud hosting, you purchase your Troux software and we host it in a secure cloud environment for a monthly service charge. Although the hardware infrastructure is shared, your instance of Troux is dedicated only to you, and not shared with any other customers. Cloud hosting is the most cost-effective hosting and license option for most customers and gives the flexibility of moving licenses in-house if necessary. Dedicated Hosting This is the best option customers requiring dedicated infrastructure for hosting their perpetual Troux software licenses. Dedicated hosting provides you a completely private hardware and software environment for Troux. Dedicated hosting allows the most extensive possibilities for data source integration and customization. Additional options for encrypted Oracle Enterprise data storage are available. Dedicated hosting may be the best option when extensive customization or data integration are necessary. Options are available for complete redundancy and failover. On Demand This is a good option for customers waiting for funds to purchase perpetual licenses, enabling them to get going immediately and then move to a Cloud Hosting or customer on-premise hosting when appropriate. Troux provides the hardware, software, and operational expertise to enable you to achieve business results most quickly and easily. 1 Based on over 2 years of usage service overview 5

Configuration and Connection Options Troux applications are renowned for their connectivity and configurability. By default, all hosting options include: Customer branding and colors on the UI Connection to local Troux Architect clients Excel-based data collection and loading Connecting to Other Systems Direct connection to other systems, such as PPM and CMDB, is also available using Troux collectors. Data transfers are fully encrypted. An additional setup charge is quoted for direct connections. Single Sign-On Integration Troux hosting supports a number of single sign-on user authentication and authorization options for Active Directory, LDAP, Computer Associated SiteMinder, SAML 2.0, and others. This enables you to manage your Troux users who use systems and processes that you already have in-house. An additional setup charge is quoted for SSO. Report and Visualization Configuration User configured reports and visualizations may be added to the system. Report and visualization configuration services are also available from Troux. Additional Configurations Where possible, we recommend that customers stay with the default system configurations, but additional configuration options, such as UI changes and workflows, are also available where required. Please contact your Troux consultant for details. Upgrades Upgrades to the latest version of Troux software are provided at no additional cost if configurations are not extensive and have been completed with the oversight of Troux consultants. For more details, please ask for a session with Troux consultants. service overview 6

Flexible Hosted Architecture Identity Management Provider Optional Identity Management SSL Encrypted Customer may optionally, at extra charge, choose to use a 3rd party identity Management Provider Standard Authentication will be based on the Troux OOTB Database Authorization Application Server Troux Metaverse One or more Application Server/ Metaverse pairs per customer Customer A SSL Encrypted Load Balancer Application Server Troux Metaverse Application Server Troux Metaverse Database Cluster Database Server Database Server Application Server Customer B SSL Encrypted Troux Metaverse Encrypted Backup Customer C Backend Firewall preventing any unauthorized Internet access. Only Admininstrative and VPN and individually specified Application Server communication allowed. Logical Firewall layer. Each Application Server will have a configured firewall that limits traffic to only the customer approved connections Cloud Files storage for encrypted backups Secure Backup Secure Backup Secure Backup Cloud File Storage Figure 2: A flexible, scalable, secure architecture Built on the World s Largest Hosted Infrastructure With more than 170,000 customers, Troux s hosting partner Rackspace is the world s leader in hosting and cloud computing. Rackspace is a leader in Gartner s December 2011 Magic Quadrant and recognized as a Top Performing Technology Company by Bloomberg. service overview 7

Security Overview Troux s hosted options are backed by some of the most comprehensive security measures available. Physical Security Datacenter access limited to Rackspace datacenter technicians Biometric scanning for controlled datacenter access Security camera monitoring at all datacenter locations 24x7 onsite staff provides additional protection against unauthorized entry Unmarked facilities to help maintain low profile Physical security audited by an independent firm Operational Security All data traffic is via HTTPS, with and SSL certificate for your instance of Troux System installation using hardened, patched OS System patching to provide ongoing protection from exploits Dedicated firewall to help block unauthorized system access VPN access optionally available Data protection with Rackspace managed backup solutions Optional, dedicated intrusion detection devices to provide an additional layer protection against unauthorized system access Distributed Denial of Service (DDoS) mitigation services based on proprietary Rackspace PrevenTier system Infrastructure Security ISO17799-based policies and procedures, regularly reviewed as part of regular SAS70 Type II audit process All employees trained on documented information security and privacy procedures Access to confidential information restricted to authorized personnel only, according to documented processes Systems access logged and tracked for auditing purposes Secure document-destruction policies for all sensitive information Fully documented change-management procedures Independently audited disaster recovery and business continuity plans in place service overview 8

Administration and Support Administration Troux s administrators typically manage all aspects of system operations and administration. This includes user management. Customers can be provided system administration rights as desired. Development and Testing Additional testing and development environments can be added and managed on request. The cost of these varies according to requirements. Please talk to your Troux consultant about the best testing and development options for you. Support Full customer software Support is provided according to Troux s Support and Maintenance agreement. On-demand users receive software Support as part of their rental price. learn more at www.troux.com Americas Headquarters: Troux Technologies 8601 FM 2222, Building 3, Suite 300 Austin, TX 78730 USA Tel: +1 512 536 6270 Fax: +1 512 231 8796 Email: info@troux.com EMEA Headquarters: Troux Technologies, UK 268 Bath Road Slough, SL1 4DX UK Tel: +44 (0) 1753 725660 Fax: +44 (0) 1753 725661 Email: emeasales@troux.com Germany: Troux Technologies GmbH Landsberger Straße 302 80687 München Germany Tel: +49 89 452 1326 0 Fax: +49 89 452 1326 29 Email: emeasales@troux.com 201204 Copyright 2012 Troux Technologies, Inc. Troux, all products prefaced by the word Troux and the Troux logos are either registered trademarks or trademarks of Troux Technologies, Inc. in the United States and/or other countries. All other products mentioned are either registered trademarks or trademarks of their respective corporations. service overview 9