White Paper: simpro Software Data Centre



Similar documents
White Paper The simpro Cloud

Enterprise level security, the Huddle way.

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0

KeyLock Solutions Security and Privacy Protection Practices

CLOUD INFRASTRUCTURE DESIGN GUIDE

Fully Managed Secure Data Sharing (a cloud service)

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA

Security from a customer s perspective. Halogen s approach to security

Projectplace: A Secure Project Collaboration Solution

REMOTE ASSISTANCE SOLUTIONS Private Server

CLOUD FRAMEWORK & SECURITY OVERVIEW

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE

Cloud Management. Overview. Cloud Managed Networks

Implementing Microsoft Azure Infrastructure Solutions

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

FormFire Application and IT Security. White Paper

Own your own Enterprise Cloud with. FlexCloud

Informix Dynamic Server May Availability Solutions with Informix Dynamic Server 11

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Private Clouds & Hosted IT Solutions

Our Cloud Offers You a Brighter Future

Security Policy JUNE 1, SalesNOW. Security Policy v v

Server Virtualization with Windows Server Hyper-V and System Center

DISASTER RECOVERY WITH AWS

Cloud Computing Disaster Recovery (DR)

CloudDesk - Security in the Cloud INFORMATION

The old Internet. Software in the Network: Outline. Traditional Design. 1) Basic Caching. The Arrival of Software (in the network)

Autodesk PLM 360 Security Whitepaper

Local Area Network System

Solutions as a Service N.Konstantinidis Technical Director - MNG

Meeting Management Solution. Technology and Security Overview N. Dale Mabry Hwy Suite 115 Tampa, FL Ext 702

Unleashing the power of real-time collaboration:

Epimorphics Linked Data Publishing Platform

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Plan For Today, Grow Into Your Future.

My Services Online Service Support. User Guide for DNS and NTP services

Cisco Network Switches Juniper Firewall Clusters

Web Hosting Recommendation Report

TalentLink Disaster Recovery & Service Continuity

Website Disaster Recovery

Perceptive Software Platform Services

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO Annual 3rd party application Pen Tests.

SysAid Cloud Architecture Including Security and Disaster Recovery Plan

High Availability and Clustering

Creating A Highly Available Database Solution

Implementing Failover Capabilities in Red Hat Network Satellite

The Definitive Guide to Cloud Acceleration

SQL Server Mirroring. Introduction. Setting up the databases for Mirroring

SaaS Security for the Confirmit CustomerSat Software

Fact Sheet FOR PHARMA & LIFE SCIENCES

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service

Implementing Microsoft Azure Infrastructure Solutions

NET ACCESS VOICE PRIVATE CLOUD

InterCall Streaming Services Security Planning and Testing

data center - why choose a data center facility

StratusLIVE for Fundraisers Cloud Operations

penelope athena software SOFTWARE AS A SERVICE INFORMATION PACKAGE case management software

Advanced High. Architecture.

DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD

Availability and Disaster Recovery: Basic Principles

Asia-Pacific Datacenter Services Market 2010 New Contenders Emerging on the Horizon

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint Deployment Guide

Security, trust and assurance

Security Whitepaper: ivvy Products

City of Dublin Education & Training Board. Programme Module for. Information Technology Administration. leading to. Level 6 QQI

Data Protection Act Guidance on the use of cloud computing

Product Overview. UNIFIED COMPUTING Managed Hosting - Storage Data Sheet

Storage and Disaster Recovery

Capability Statement GO

Technical specifications

Pacnet Hong Kong CloudSpace2 Technical Specifications. Upholding the Principles of Efficiency and Sustainability in Data Center Design

CHOOSING A RACKSPACE HOSTING PLATFORM

HealthLink Security Policy

Security & Infrastructure White Paper

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Table of Contents. Overview... 1 Introduction... 2 Common Architectures Technical Challenges with Magento ChinaNetCloud's Experience...

POWERING A CONNECTED ASIA. Pacnet Hong Kong CloudSpace1 Technical Specifications. Asia s Pioneering Facility with Direct Subsea Cable Access

Using AWS in the context of Australian Privacy Considerations October 2015

PROMAPP TECHNICAL INFORMATION

Transcription:

White Paper: simpro Software Data Centre

White Paper: simpro Software Data Centre Where is the simpro Data Centre?... 1 Hong Kong (Primary Data Centre)... 1 Chicago (Secondary Data Centre)... 1 What About Data Redundancy?... 2 Layer 1... 2 Layer 2... 2 Layer 3... 2 Can You Explain More About Your Network?... 3 How Secure (Physically and Digitally) is the Data Centre?... 4

Where is the simpro Data Centre? Good question, we actually have several locations for our data centres: Hong Kong (Primary Data Centre) Our primary data centre provider is a U.S. based company called Rackspace. They are the data centre of choice for some big names such as ANZ Bank, Virgin, Australia Post, Telstra, Rio Tinto, Village Roadshow and Xero to name a few. Rackspace offers hosting services to more than 60 000 customers across nine data centres worldwide. They have 2600 employees (termed Rackers) and over 13 years of experience in the data centre hosting game. Make no mistake; this is a premium hosting solution. We have selected Hong Kong as a result of extensive testing. The country s location and carrier availability make it one of the safest places to host our cloud environment. Along with Australia, New Zealand, the U.S. and Canada, Hong Kong is also a signatory to an APEC Agreement on cross border privacy enforcement. Please see the following link for more detail: http://www.apec.org/about-us/about-apec/fact-sheets/apec-cross-border-privacy-enforcement- Arrangement.aspx In terms of physical infrastructure, let s say all of the physical cables (of which there are many) in Australia were cut off - we would still have redundant satellite connections to the outside world. Hong Kong and Hawaii are the two main hubs of the world s Internet traffic. Taking into account its closer proximity and better stability, we opted for Hong Kong. Chicago (Secondary Data Centre) In the Chicago data centre we have created an additional backup environment in case of a catastrophic physical failure in our primary data centre. Every night at 1am, the entire data centre is replicated to this secondary data centre. This means that in a worse case scenario we are able to fall back to the secondary backup and your data is safe as of 1am the previous night. 1.

What About Data Redundancy? Layer 1 Our private network in Hong Kong has multiple layers of redundancy. The front-end server that is used to host the primary system is replicated with a secondary or slave server in the background. This means that every time a transaction occurs on the database, the exact same transaction occurs on the secondary server. In the unlikely event of a problem occurring on the primary server, we can switch users to the secondary server without any loss of data. Layer 2 At 1am every night, all data in our primary data centre (including customisations, databases and attachments) is automatically uploaded and restored to the secondary data centre in Chicago. This ensures that in the event of a catastrophic failure in our primary data centre, we can fall back to the previous night s backup from the secondary data centre in the time it takes for DNS to update. Layer 3 Each night, databases and attachments are backed up on the Amazon S3 file storage solution. The Amazon S3 solution gives us an enterprise grade data backup solution that is replicated throughout the global Amazon network. Known as eventually persistent storage, once a backup is sent to the server, it s distributed throughout the network and available for use within seconds. 2.

Can You Explain More About Your Network? Essentially our primary data centre arrangement consists of three main hubs: Hong Kong, Chicago and Amazon. Behind the firewall in Hong Kong we have an array of front-end servers and slave servers. The slave servers then communicate with the Chicago and Amazon servers for mirroring and backups. The servers in the Australian data centre are essentially standalone servers without the redundancy and fault tolerance of the primary data centre. However, they do still backup amongst the other servers in the cluster. 3.

How Secure (Physically and Digitally) is the Data Centre? Our data centres are world-class facilities and SAS 70 accredited. SAS 70 accreditation stipulates no public access to the data centre floor at any time. Conversely, 90% of the data centres here in Australia are typical colocation arrangements, meaning that every customer has access to the server hall with only an individual cabinet separating devices. On a like-for-like basis, there are very few facilities in the world that can contend with our stringent security policies. The front-end of the private networks in our data centres are controlled with firewalls requiring multiple levels of authentication. Once initial access is gained, the servers then require additional authentication making the task of logging onto a server a three-stage authentication process. All databases are further protected with their own usernames and passwords. Using only Linux servers also makes us less prone to security exploits compared to other operating systems and ensures we have a stable, secure and reliable platform on which to deliver your software. 4.