Freedom for Servers, Drives & Desktops

Similar documents
RemoteApp Publishing on AWS

activecho Driving Secure Enterprise File Sharing and Syncing

Bitdefender GravityZone Sales Presentation

Centrify Cloud Connector Deployment Guide

Uni Vault. An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service. White Paper Solution Brief

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Security Architecture Whitepaper

Secure Your Mobile Device Access with Cisco BYOD Solutions

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Virtual Desktop Infrastructure Planning Overview

Systems Manager Cloud Based Mobile Device Management

Release Version 3 The 2X Software Server Based Computing Guide

When enterprise mobility strategies are discussed, security is usually one of the first topics

DISASTER RECOVERY WITH AWS

What Is Cisco Mobile Workspace Solution?

How To Create A Virtual Private Cloud On Amazon.Com

Release Version 4.1 The 2X Software Server Based Computing Guide

Extending your Enterprise IT with Amazon Virtual Private Cloud. Oyvind Roti Principal Solutions Architect, AWS

Cloud Backup and Recovery for Endpoint Devices

Gladinet Cloud Access Solution Simple, Secure Access to Online Storage

Virtualization Support - Real Backups of Virtual Environments

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Assignment # 1 (Cloud Computing Security)

Backup with synchronization/ replication

FileCloud Security FAQ

Installation and Setup: Setup Wizard Account Information

Every Silver Lining Has a Vault in the Cloud

Cloud Computing Security: Public vs. Private Cloud Computing

NetSupport Manager v11

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Anchor End-User Guide

AVLOR SERVER CLOUD RECOVERY

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA

MEGA Web Application Architecture Overview MEGA 2009 SP4

Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy

VMware End User Computing Horizon Suite

The Cloud for Productivity and Mobility

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

Challenges in Deploying Public Clouds

Cloud Store & Share Frequently Ask Questions

Windows Server 2012 R2 The Essentials Experience

Grid and Multi-Grid Management

RFI Template for Enterprise MDM Solutions

Powerful analytics. and enterprise security. in a single platform. microstrategy.com 1

Proactively Secure Your Cloud Computing Platform

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

CoIP (Cloud over IP): The Future of Hybrid Networking

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

Radia Cloud. User Guide. For the Windows operating systems Software Version: Document Release Date: June 2014

Easily Managing User Accounts on Your Cloud Servers. How modern IT and ops teams leverage their existing LDAP/Active Directory for their IaaS

5 Essential Benefits of Hybrid Cloud Backup

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

IAN MASSINGHAM. Technical Evangelist Amazon Web Services

Kony Mobile Application Management (MAM)

Maximizing Your Desktop and Application Virtualization Implementation

WD My Cloud EX4 Personal Cloud Storage Release Notes for Firmware

Symantec Backup Exec.cloud

All can damage or destroy your company s computers along with the data and applications you rely on to run your business.

Interact Intranet Version 7. Technical Requirements. August Interact

Summer 2013 Cloud Initiative. Release Bulletin

How To Use Windows Small Business Server 2011 Essentials

Remote Voting Conference

Parallels Server 4 Bare Metal

BES12 Frequently Asked Questions. BEs12. questions. FAQs

ArcGIS 10.3 Server on Amazon Web Services

activecho Frequently Asked Questions

Egnyte Cloud File Server. White Paper

Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser

Security Overview Enterprise-Class Secure Mobile File Sharing

DLT Solutions and Amazon Web Services

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Secure iphone Access to Corporate Web Applications

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

Unisys ClearPath Forward Fabric Based Platform to Power the Weather Enterprise

Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC

Maximizing Your Desktop and Application Virtualization Implementation

Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide

How to Turn the Promise of the Cloud into an Operational Reality

What Is Microsoft Private Cloud Fast Track?

AirWatch Solution Overview

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Ensuring the security of your mobile business intelligence

Propalms TSE Deployment Guide

Implementing Microsoft Windows Server Failover Clustering (WSFC) and SQL Server 2012 AlwaysOn Availability Groups in the AWS Cloud

The Cloud App Visibility Blindspot

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents

ADDING STRONGER AUTHENTICATION for VPN Access Control

Famly ApS: Overview of Security Processes

Transcription:

a cloud commerce marketplace THE CLOUD REVOLUTION: Freedom for Servers, Drives & Desktops...cloud computing is enabling small and medium businesses (SMBs) to compete with the upper echelon of corporate America. (303) 790-4848 (855) 884-PAX8 info@pax8.com pax8.com Security Data Management & Collaboration Hosted Communications Mobility Infrastructure Business Productivity

-

The Cloud Revolution There has been so much talk about the cloud lately that it seems like old news. The truth, however, is that cloud adoption is hotter than ever. In years to come, the standard model for the delivery of computing power will be akin to receiving electricity from a power grid. Electric companies have eliminated the need for generating personal electricity. Similarly, cloud computing will eliminate the need for a business to manage its own network and IT system components. Laptops and desktop computers will no longer be tasked with the heavy lifting. Meanwhile, critical systems and data stores are maintained and managed with an unprecedented level of expertise. The cloud is a game changer. The Cloud Revolution has begun. In addition to lower costs and improved efficiency, cloud computing offers flexible scalability, elasticity, payment models linked to usage, and access to a wide variety of business automation software. Through its ease of access, low cost and abundant services, cloud computing is enabling small and medium businesses (SMBs) to compete with the upper echelon of corporate America. The Virtual Private Cloud Among one of the most exciting recent developments is the Virtual Private Cloud (VPC) for SMBs. A VPC is a private network in the cloud that consolidates scattered computer resources and assets, streamlining them into an efficiently managed and monitored system while providing employees access from anywhere on any device, including their tablets, phones or home computers. Think of a company s VPC as their own private mini-data center. Today s SMBs need and can benefit greatly from - the virtual private cloud because it gives them an enterprise level of efficiency in their technology, with increased reliability and unparalleled flexibility. The traditional environment of servers and workstations is no longer cost effective. Cloud computing eliminates hardware and software capital costs, administration costs, upgrade costs, and the cost of ownership and footprint. Besides lower cost, the key drivers for SMBs include the capability to expand their local network, strengthen network security, provide administrators and users access from anywhere, improve protection of mission-critical data, and reduce reliance on-premises hardware and software. Partnership with the IaaS Leader Though there are many providers that offer the capability to construct a VPC on their infrastructure, Amazon Web Services (AWS) is the clear market share leader. In fact, AWS services more than five times the computer capacity than the aggregate total of the other 14 providers in Gartner s Magic Quadrant. AWS is the IaaS provider of choice for many notable companies, including Dow Jones, LinkedIn, Expedia, Unilever, SAP, Citrix, Adobe, Nokia, Netflix, Bristol-Myers Squibb, News Corporation, and Newsweek, just to name a few. The US Central Intelligence Agency has recently signed a 10-year $600 million cloud contract with AWS. Interestingly, the CIA chose AWS over a leading competitor even though the AWS bid was $54 million higher, with the rationale that the extra fee was offset by Amazon s superior technical solution. VPC Made Simple AWS IaaS services are optimized for flexibility rather than simplicity, requiring specialized expertise in order to configure a complete network. Solution-based cloud marketplaces such as Pax8 have teamed up with AWS to develop cloud marketplace catalogs that automate the set up and configuration of the VPC along with all its components and integrated management software for the best SMB experience. With the advent of this marketplace, obtaining a ready-made VPC is as simple as specifying the server size, the number of workstations, and the size of the shared disk. Each user on the system is sent login credentials, whereupon users are ready to log into a completed system. Figure 1 - Using the as an example, the virtual network design is optimized with rich feature sets specifically with SMB business applications in mind. The VPC suite consists of three basic components: a server, desktop, and network drive. It is not necessary to purchase all the VPC components at once. The system is based on a modular design approach. If a single component is purchased, say a single desktop, it is configured in a VPC so that when additional components are purchased, they can be automatically configured with existing components to create a fully integrated solution. 3

If, for example, a server is subsequently ordered on the same account, then that server automatically becomes the domain controller for that workstation. Software installed on that server can be run seamlessly from the desktop. If another desktop is purchased, then that desktop is also added to the network with the same capability. If a network drive is subsequently ordered on that same account, then that network drive is seen from all desktops and the server can be used to control access to it. Let s take a closer look at the various attributes of this network....no restrictions are placed on how the server can be used in the cloud environment. Security. Each VPC is isolated from external threats by a series of preventative measures, which include containing each VPC in its own isolated subnet, protecting the VPC with an enterprise-grade firewall, protecting each computer on the VPC on an OS-level firewall for more granular access control, and encrypting Remote Desktop Protocol (RDP) connections to servers and desktops. Server. The server comes with a complete install of Windows 2012. Full administration permissions are granted to the administrator, the communications of which are SSL-encoded. Unlike servers offered on many other IaaS platforms, no restrictions are placed on how the server can be used in the cloud environment. The Active Directory is fully operational, and can be used to control access to desktops, just as they would be in a typical on-premises network. You can also install software on the server, just as you might on your on-premises network. Desktops. Every desktop comes with a fully installed Windows OS. Each user receives a login to their own desktop. If a server has been requested, then it will be mounted on the same VPC, enabling the capability to run software that resides on the server seamlessly. Network drives on the VPC will appear as a mapped drive on each of the desktops. Access to Server and Desktops. Access to desktops and servers are achieved through an RDP. These clients are free, and are available for a variety of devices, including Windowsand ios-based PCs, laptops, tablets and phones, and Android phones. Users simply download the RDP software onto the desired computer or device, install, and enter login credentials. A window will open on the client device that displays the user s desktop in the cloud. If desired, additional windows can be opened for other desktops and the server, resulting in one window on the client for each cloud computer. It is also possible to make selections on the RDP software that will automatically map the disk drives on a local computer to the cloud computer, enabling easy transfer of files between the computers. Cloud Network Drive. One of the most powerful components on the VPC network is the network drive. When launched, this network drive will map to every computer on the private cloud. In addition, client software is available for Windows and ios that allows a permanent mapping of that network drive to local machines as well. Now your cloud computers and your local devices share the same file folders, making it easy to share files between your local and cloud computers, as well as with the computers of fellow employees. Files can also be accessed from Windows-, ios-, and Android-based devices. This opens the road to easy collaboration and file sharing. Access permission to individual folders can be controlled by an individual user or centrally from the server. The data and file permissions on an existing network drive can easily migrate to the cloud network drive with an easy-to-use migration tool. The cloud network drive is flexibly configured, allowing the drive to deliver a number of important functions. Cloud Drive. The cloud network drive becomes an extension of your storage capability without consuming local disk space. The cloud drive is automatically mounted as a network drive on the cloud computers. Client software is available for local Windows or ios computers to mount the cloud drive on local computers as well. Files can be used directly by applications on your local machine or on your cloud computer. File Sync. Files on local machines can be synchronized to the cloud drive, thereby making them available from anywhere from a wide variety of devices. File Backup. The cloud drive can be set up to keep a copy of file versions as they change over time. The number of previous file versions to be kept can be specified as desired. Image backup. Image backups produced by third party software, such as Infrascale Bare Metal Backup (Shadow Protect), can be stored on the cloud drive so that a copy exists outside the local facility. This type of protection guards against facility catastrophes such as fire, flood, or electrical surge that could destroy multiple machines at once. File Transfer. Since the cloud drive is visible from a variety of local devices as well as cloud computers, it serves as an ideal method of transferring files between local devices and cloud resources. The cloud network drive is flexibly configured, allowing the drive to deliver a number of important functions. 4

User Management. User permissions to folders on the cloud drive can be managed from a centralized dashboard. Group policy permission structures can be imported. LDAPs can also be set up, if desired. Mobile Accessibility. Data on cloud drives is accessible through an app, available through the itunes Store for ios devices and Google Play for Android devices. Connecting the VPC with a LAN A plan for connecting a business local LAN to their VPC enables the business to migrate from on-premises environment to the cloud incrementally. For example, when a new employee joins the company, a desktop could be added to the VPC while the server to control access to that workstation is on the local LAN. Or, perhaps the business would like to place the server on a VPC, while leaving all or some of the employees on desktops connected to the local LAN. This functionality can be achieved with a VPN. When a VPN is configured between the router on the local LAN and the VPC, the two networks will act as a single unified network. With it in place, a computer sends and receives data across the two networks as if they were directly connected to a single network through the use of secure tunneling protocols. (See Fig. 2) VPN Private Virtual Cloud Private-Public DMZ Networks The network structure described above can be extended to a structure that divides the network into two parts, a public facing network sometimes called DMZ network or perimeter network, and a secure private trusted network sometimes called the internal network or screened subnet. This type of network is appropriate for businesses that have a need for both a highly secure network that can be accessed only by trusted individuals and a separate network that is exposed to the public. The basic structure of this type of network is illustrated above. The DMZ network is connected to the Internet through a firewall, which has all necessary ports for the public applications open. For example, the DMZ might run a web server for which ports 80 and 443 are open. Requests made to a machine on the internal network are routed through a Proxy Server, which contains rules for allowing access. The internal network is isolated, and contains only instances that are not addressable from the outside. The Proxy server acts as an intermediary for requests from clients seeking resources from the server inside the internal network. This configuration is more expensive since it requires two independent networks and a server to regulate the traffic between those two networks. Computers that communicate directly with the Internet are placed in the DMZ instead of the internal network. The DMZ is still protected by a firewall, but because certain public traffic is permitted into the DMZ, it is easier to hack. The good news is that even if the DMZ gets hacked, it does not compromise the security of the internal network because it is a completely separate, isolated network. Private Virtual Cloud Figure 2 - VPN configuration DMZ Proxy Server Internal Network Internet Figure 3 - Private-Public DMZ Network 5

High Reliability Fault-Tolerance Networks Another standard network extension is a high reliability network. This is achieved by creating separate subnets inside the VPC, and placing each subnet into distinct availability zones, while utilizing a load balancer to direct the traffic into a primary or secondary location. Internet Join the Cloud Revolution! The cloud, and specifically cloud networking, levels the playing field for SMBs by giving them access to the same networking infrastructure and computing power enjoyed by enterprises, at substantially lower costs. The last piece of the puzzle is starting to come into focus cloud marketplaces that manage the cloud supply chain and integrate services to create powerful and productive business solutions for SMBs. Pax8 is pioneering this frontier. Load Balancer Secondary Network Primary Network Figure 4 - High-reliability Fault Tolerance Network This configuration comes at a higher price in that the network needs to be duplicated across two data centers and traffic regulation components need to be added. The benefit of this configuration is that in the unlikely event that one of the data centers go down, access to the system is uninterrupted by passing that load to the second system. About Pax8 Pax8 is a cloud commerce marketplace, delivering strategic integrated cloud services to businesses through its global network of channel partners. Pax8 is leading the transformation of its partners businesses to become cloud centric by efficiently delivering aggregated cloud solutions through its proprietary cloud marketplace technology platform, and accelerating existing client adoption and new client growth through its proven, collaborative customer acquisition programs. (303) 790-4848 (855) 884-PAX8 info@pax8.com pax8.com Security Data Management & Collaboration Hosted Communications Mobility Infrastructure Business Productivity 6 Cloud Revolution: Freedom For Servers v030514