FUJITSU Cloud Service S5 Service Overview

Size: px
Start display at page:

Download "FUJITSU Cloud Service S5 Service Overview"

Transcription

1 FUJITSU Cloud Service S5 Service Overview Date: 20/07/201 Page 1 of 18

2 Contents 1. INTRODUCTION Summary Typical Deployment Administrative Roles Standard Service Service Features SERVICE ELEMENTS Virtual Machine and Virtual System Storage Operating System Software Middleware Firewall Load Balancing Global IP Address Service Internet Connection Service IPsec VPN Gateway Connection Service System Template Service Management Indicative Timings for Provisioning / De-Provisioning Open Source Software Used Password Management FURTHER INFORMATION Signup and Credit Checking Cancellation Invoicing and Charges Service Levels Support Service Accreditations Security Access to and Use of the Service Self Help Training DEFINITIONS ADDITIONAL DOCUMENTATION CHANGE CONTROL Date: 20/07/201 Page 2 of 18

3 1. INTRODUCTION 1.1 Summary The FUJITSU Cloud Service S5 service delivers an Enterprise grade, dynamic, self-provisioned, pay as you go, highly available, Infrastructure as a Service (IaaS) from multiple Tier III data centres in key regions around the globe: UK, Japan, Australia, Singapore, Germany and the USA. The UK region benefits from two autonomous instances of the platform, delivered from two separate data centres providing enhanced resilience capability and guaranteed UK data residency. Both UK FUJITSU Cloud Service S5 platforms are also asserted by Fujitsu as suitable for usage by the Public Sector for OFFICIAL & OFFICIAL-SENSITIVE. This Service Overview describes the UK hosted instances of the platform The Service delivers multi-tenanted capability from a pool of IT resources (network, storage and compute) and provides customisable virtual environments based on a set of pre-defined operating system templates (Windows and Linux). Procurement, configuration and management of these for UK hosted resources are achieved using the platform s Web Portal or the API (see (London East Data Centre) or (London North Data Centre)). Each platform portal includes an infrastructure design studio to allow definition or selection of templates to create multitier architectures (maximum of three), enabling rapid deployment of infrastructures. Capacity can be scaled both up and down in line with computing demands through API commands or directly through the design studio. Although each platform is independent, a customer choosing to sign up to both portals can benefit from 100% UK data residency and enhanced levels of connectivity via either Internet as standard or Inter-DC or Global WAN (GWAN) network connectivity at additional cost between their virtual systems. This provides enhanced Disaster Recovery and Business Continuity functionality, for use within a customer s DR strategy and planning. Date: 20/07/201 Page 3 of 18

4 1.2 Typical Deployment A typical deployment for an IaaS Customer might be a three-tier web-facing system protected by a firewall. The first tier may be for front end web services that are load balanced for optimum web performance. The second tier may be for a middleware tier for business logic. The third tier may be used for a dedicated database layer. The Internet HTTP/HTTPS Requests from the Internet Firewall Controlled Access to SECURE1 Optional Internet Access Firewall Controlled Access to SECURE2 1.3 Administrative Roles There are key roles defined for customers who are consuming the service: Customer: Responsible for the contract to use the platform Responsible for setting up Resource Administrators Responsible for paying for services consumed Resource Administrator: Creates and maintains one or more Virtual Systems 1.4 Standard Service The platform allows the creation of multi-tier Virtual Systems (vsys) that combine servers, firewalls, load balancers, storage and network into complete system definitions. These definitions can also be reused through the creation of Date: 20/07/201 Page 4 of 18

5 system templates to ease the work associated with deploying common solutions. Currently the following predefined Infrastructure-as-a-Service templates are available. IaaS Operating System Options: Windows Server Red Hat Enterprise Linux (RHEL) Ubuntu CentOS Linux The platform also provides access to common shared services (DNS, NTP, KMS, WSUS, and YUM) when one or more Global IP Addresses are added to a vsys. The portal also provides access to a service dashboard where system status can be monitored, VMs can be managed (Stopped/Started/Backed up/restored), resource usage can be displayed and charging monitored. The Virtual System can be accessed by defined Global IP addresses through the Internet or through Virtual Private Networks including IPsec VPN gateway over Internet or Intranet MPLS connectivity. The Global IP addresses can be mapped onto internal load balanced IP addresses, which can be adjusted through the Service Portal to accommodate changes or failure conditions. Metering data is collected to charge for usage of resources and functions. Where several Virtual Systems exist within one contract, per-system charge totals are calculated, and presented as a single bill. The main components of the platform are: Service Portal (Design Studio & System Manager): consolidated management of resources, including deployment of VMs, deployment of systems through the use of templates, management of IDs and certificates, and checking of logs. API: By using the API it is possible to execute the same operations as from the service portal Authentication Server: used to manage the User information associated with the IDs and client certificates related to this Service Shared Service Servers provided for use by all customers: Domain Name Server (DNS) provides name resolution when accessing the internet from the Virtual System Time Synchronisation (NTP) provides synchronised time across VMs and configured appliances Key Management Service (KMS) provides an activation service for Windows Server 2008/2012 VMs. Windows Server Update Services (WSUS) provides access to the latest Microsoft patches. Yellowdog Updater Modified (YUM) provides updates to the Linux VMs Customer Virtual Systems: single or multiple virtual systems, each with up to three segments (DMZ, SECURE1, and SECURE2) containing the virtual resources (virtual servers, firewalls, load balancers and storage) 1.5 Service Features Support The Service is designed for commercial and enterprise use by UK Customers and includes, as part of the service charge, a 24*365 first line service desk, backed by 2nd to 4th line support for the FUJITSU Cloud Service S5 infrastructure accessed via phone or , see paragraph 3.5 of this Service Overview for further detail Availability The platform is engineered and designed to be enterprise-ready, offering high levels of resilience, built-in redundancy and security, with an availability SLA of 99.95%. In the UK, the Service is operated out of two Tier III Data Centres, providing a choice of geographical location with guaranteed UK data residency. In addition, the London North Data Centre is Gold certified by the Uptime Institute for its design, build and operational sustainability. The platform provides un-contended performance for Virtual Machines and provides Internet connectivity as standard with an option of a Private MPLS Network connection (Intranet connection). The physical infrastructure used provides full hardware redundancy. This is achieved by mirroring of storage chassis and chassis-internal RAID mirroring, redundancy of network devices and under-floor cabling. If a problem occurs with a Date: 20/07/201 Page 5 of 18

6 physical device, the affected VMs will be moved to another physical server automatically by the service, thereby minimizing the downtime of the virtual system. In this case, the data that was written to disk just before automatic recovery will be saved. When there are indications of pending failure of physical devices, or when maintenance is performed at the data centre, VMs operating on the relevant physical servers are moved to other physical servers retaining their services and information in memory Flexibility Capacity can be increased or decreased within minutes, controlled by accessing the Portal or programmatically via the API. VMs that have been reserved, but turned off, are available as and when needed Security Several security technologies are used in the foundations of the service. A User is prevented from operating systems other than systems within the contract. Each system is separated by Virtual Network Technology (separation from each system network). Users cannot send/receive packets between other Users. However, Users are able to send/receive packets between the systems within the same contract. Every virtual system has a built-in firewall (security for connection to external network); by configuring the firewall rules, the Customers control the network flow from/to outside. The firewall also includes a built-in configurable Intrusion Detection system (IDS) and Intrusion Prevention System (IPS) offering 9 different attack patterns. Each disk (system disk, additional disk, backup disk, template preservation disk) is separated by Virtual Storage Technology (data security), in order not to be read by Users other than the owner. Storage provided by the service is also encrypted and is retained within the Fujitsu Data Centre. Data in the disks is deleted by the zero write method, so that other Users who may use the same data area subsequently cannot read it. Storage provided by the service is also encrypted and is retained within the Fujitsu Data Centre. To ensure membership of the service is restricted to Business Customers, access to the Service is restricted to Customers who have passed commercial identity and credit checks. To track Customer operations, all operations performed by the Customer's service manager are recorded and kept for five years to enable retrospective audits. The event logs output by Customer systems are kept for one month. Using the System Manager on the service portal, Users can display event logs, firewall and SLB statistical information (viewing can be controlled with User privileges). The client certificates used when connecting to the service portal and to Customer systems use SHA-256 bit hash function and RSA 2048 bit encryption algorithm. Login to the service portal requires two levels of authentication; a client certificate (SHA-256bit/RSA 2048bit) and an ID/Password. Passwords must be between 16 and 64 characters in length. Also, when using client certificates, PINs between 16 and 31 characters in length can be specified. The authentication server itself can only be accessed from the service portal or the public API. A client certificate is necessary when using the API Charging Charging is on a unit-based charge system based on the utilisation of services with billing generated monthly in arrears. The Charges are incurred from when use of resources and functions are started, and when the Service Agreement allows for multiple systems, charges are calculated for each system. A single bill is provided for each Agreement; resource usage and billing information is available on the Service Portal. Customers can check or export monthly reports in PDF format and display the usage statistics of each virtual system as either tables or graphs including historical details up to 12 months. See paragraph 3.3 of this Service Overview for further information on the charge types. Date: 20/07/201 Page 6 of 18

7 2. SERVICE ELEMENTS The following are elements of the service. 2.1 Virtual Machine and Virtual System Virtual Machines (VM) are hosted in virtual containers known as a virtual system (vsys). Each vsys can host up to 20 VMs by default, with a maximum of 200 vsyss per customer contract. The platform provides a shared 1Gbps network supporting IPv4. Each customer must choose an address range from those reserved by the Internet Assigned Numbers Authority (IANA) for private networks, after which servers are automatically assigned a fixed IP address. At a minimum, each vsys comes with one network segment, known as a vnet. Each vsys has a DMZ vnet which can be configured to allow Internet access. A further 1 or 2 SECURE (no inbound internet access) vnets can be added at the point of creation, allowing the option of a 1, 2 or 3 tier network. Once the vnet topology has been configured, it cannot be changed. vnets communicate with other vnets and vsyss via the vsys Firewall. The firewall can also be configured to provide static Network Address Translation (NAT), with the option to configure dynamic NAT for both Destination Network Address Translation (DNAT) and Source Network Address Translation (SNAP-T), or a combination, for Public global IP to internal IP address translation. VIRTUAL MACHINE Functions Provided Type of Virtual Machine Number of virtual CPUs CPU performance index *1 Memory allocation Mini GB Economy GB Standard GB Standard GB Standard GB Standard GB Advanced GB Advanced GB Advanced GB Advanced GB Advanced GB High- Performance GB High- Performance GB High- Performance GB Double-High GB Double-High GB Double-High GB Quad-High GB Quad-High GB Quad-High GB System disk Operating system provided Windows Server 2012 / 2008SP1 = 180 GB Windows Server 2008 / RHEL = 40 GB Ubuntu / CentOS = 10 GB As listed in 2.3 Date: 20/07/201 Page 7 of 18

8 Middleware software provided Number of private IP addresses allocated to Virtual Machines Number of NICs allocated to Virtual Machines Number of additional disks that can be connected to Virtual Machines Disk capacity for system backups & snapshots Disk capacity for data area backups & snapshots As listed in auto-allocated via DHCP (Multiple user-defined private IP addresses can be assigned statically per VM NIC) 1 default NIC per VM Addition multiple NICs (max total 8 NICs per VM) can be allocated per VM to any vnet, on deployment Maximum 140 NICs per vnet segment. Up to 14 disks (The capacity of each disk can be specified in multiples of 10 GB between 10 GB and 10 TB) The disk capacity required for the system backup and snapshots is automatically allocated when backups are taken. The capacity for additional disk backups and snapshots is automatically allocated when backups are taken. *1 CPU performance index 1 is equivalent to a 1.0 GHz Xeon (2007) CPU. VIRTUAL SYSTEM Functions Provided Number of virtual networks per Virtual System Number of firewalls per Virtual System Content Select per active tier from 1- tier, 2-tier and 3-tier systems Normal or Turbo Firewall option, covering all active segments (DMZ, SECURE1, SECURE2). Redundant Firewall option for Active/Standby switching Firewall Throughput Normal: Mbps Turbo: Mbps (*based on 1518 byte packet size) Number of global IP addresses that can be acquired per Virtual System Maximum VPN connections Maximum number of firewall rules Further technical specifications for the service are available from the Portal. 2.2 Storage The size of the system disk and any additional storage is defined with the Virtual Machines. Disks are established as persistent volumes until the Resource Controller chooses to destroy those disks from their inventory. Disks can be moved between VMs, with the data remaining accessible as long as the disk is initially formatted using a method suitable for all potential VM owners, e.g. NTFS between Windows VMs. System disk storage is only destroyed when the VM is destroyed Data Management Data backups - Multiple generations of backups can be taken by the Customer executing backups from the Service Website. The Customer shall be responsible for data backups and shall hold Fujitsu harmless for any damage, destruction or loss of data. Date: 20/07/201 Page 8 of 18

9 Data erasure - Data held on a VM system disk or data disk is erased using a multiple Zero-Overwrite method when the VM or data disk has been deleted. It is the Customer s responsibility to extract any relevant data prior to one of these disks being deleted. Data encryption - The data on disks is held in encrypted form, using ETERNUS encryption. For more details, please check the following web-site: (English) ETERNUS encryption provides Equivalent security level with AES (128 bit) method. The length of encryption key of this mode is 123 bits. The speeds of encryption and decrypt is 3 ~ 4 times faster than AES method. STORAGE OPTIONS Product Disk Expansion Option Template Backup System Backup Data Disk Backup System Snapshot Data Disk Snapshot Pricing Unit 1GB*Hour 1GB*Hour 1GB*Hour 1GB*Hour 1GB*Hour 1GB*Hour Data Extraction / Removal Criteria Data extraction for Windows based operating systems is provided by converting the system and data disks devices to virtual hard drive (VHD) files and exporting either via the management SSL VPN or via the Internet using standard file transfer protocols such as FTP. This is a Customer operation as Fujitsu does not retain administrator privileges on VMs deployed by Customers. Non FUJITSU Cloud Service S5 VMs that have been imported into FUJITSU Cloud Service S5 can also be exported to a VMDK file using the portal (system disk only). This is a self-service feature, for VMs running a supported Operating System and meeting the terms and conditions of the platform. Additionally, FUJITSU Cloud Service S5 originating VMs (system disk only) can be exported to VMDK for import into another FUJITSU Cloud Service S5 island instance, but the hosting of a FUJITSU Cloud Service S5 VM outside of FUJITSU Cloud Service S5 is not supported/permitted Backup and Restore Service Using the System Manager from the service portal, it is possible to perform backup and restoration of system disks and additional disks of VMs. Multiple generations of persistent backups (there is no limit on the number) can be collected and managed as a list. When performing backup and restoration of system disks, it is necessary to stop the VMs on which they are mounted. It is necessary either to stop the VMs that additional disks which are the target of backup/restore are attached to, or to detach additional disks from their VM. Once backup is started the VM and any attached additional disk can be started with the backup taking place in the background. The backup will not reflect changes after starting the VM. Additional Disk Backups may be replicated to other vsys or Contracts. A separate Snapshot facility is also available for both System Disk and Additional Disks. Additional Disk snapshots may be initiated while system is booted or running. Snapshots are full-disk copies, allowing reversion to the disk configuration saved at that time and are deleted on restoration. Multiple snapshots may be taken and held as a list, for reversion to any one at a later date. It is important to note backups within the platform are held within the same secure and highly resilient storage infrastructure. Should you require an off-site full backup solution Fujitsu are able to offer this as an additional service via the Backup as a Service offering Date: 20/07/201 Page 9 of 18

10 2.3 Operating System Software SOFTWARE Product Windows Server 2008 Standard Edition R2 64bit Windows Server 2008 Enterprise Edition R2 64bit Windows Server 2012 Standard Edition 64bit Windows Server 2012 R2 Standard Edition 64bit CentOS 5.x/6.x (32bit) CentOS 5.x/6.x (64bit) Ubuntu 14.x (64bit) RHEL 5.x/6.x 64bit Minimum / Full Support Licensor Microsoft Microsoft Microsoft Microsoft Red Hat 2.4 Middleware The table below sets out the Middleware that are available. MIDDLEWARE Product SQL Server 2008 R2 Standard Edition SQL Server 2012 Standard Edition SQL Server 2012 R2 Standard Edition SQL Server 2014 Standard Edition PHP / PostgreSQL PHP / MySQL Tomcat / PostgreSQL Tomcat / MySQL Ruby / PostgreSQL Ruby / MySQL Development Support Tools [SVN, Jenkins, &c.] Licensor Microsoft Microsoft Microsoft Microsoft 2.5 Firewall Every vsys will always have a single firewall deployed, with optional Redundant Active/Standby facility, to secure the vsys. Authorised users can control how the vsys communicates with the Internet as well as between internal segments. The Firewall Service includes the following functionality: Normal (default), or Turbo firewall mode option Redundant Firewall (Active/Standby) option, with duplicate configuration, auto-failover & manual switchover facility, for both firewall modes. Additional charges apply. Configure up to 800 maximum access control rules per vsys. NAT (Network Address Translation) static 1-to-1 Public to Private IP duplex mapping, or dynamic NAT (D- NAT/SNAP-T) facility. Users can set IP address translation settings for communication with the Internet. Log files and export facility that correspond with firewall rules activity are provided. Ability to both save Firewall rules for offline editing or backup and to upload firewall rules for consistent implementation or duplication, via CSV file format Backup/Restore firewall configurations Performance monitoring of Firewall operation IDS/IPS offering 9 different configurable attack patterns Date: 20/07/201 Page 10 of 18

11 2.6 Load Balancing Customer VMs require regular system maintenance which will sometimes require VMs to be restarted. A Server Load Balancer (SLB) VM can be used to reduce the impact of maintenance or physical hardware failure. It can also be used to distribute incoming load requests on ports across multiple web servers or VMs using standard load-balancing algorithms. Normal and Turbo SLB chargeable options are available providing from (Normal) or 750 to 2000 (Turbo) transactions per second capability, depending on SSL encryption key length. Maximum supported HTTPS concurrent connections is Packet capture and log export are available, plus Performance Monitoring of SLB operations. A Redundant SLB facility option is available, for both SLB mode options, providing an auto-synced configuration of Active/Standby SLB auto-failover and manual switchover facility, should the SLB primary device fail. Additional charges apply. The Load Balancing Service balances accesses to a single IP address within a virtual system across multiple Virtual Machines that have been registered as a load balancing group. By using SLB for multiple VMs it is possible to keep services operating when failover occurs on a specific VM or to load-balance high-volume access requests across multiple servers. When multiple VMs are operated together using load balancing there is no need to stop the entire service during maintenance. Each VM in a group for which load balancing is being performed can be switched to maintenance mode (excluded from the group) and released from maintenance (included in the group). 2.7 Global IP Address Service The Global IP Address Service provides up to 10 global IP addresses per vsys that are required to perform Internet communications from the Virtual System. It is the responsibility of the Customer to amend DNS routing that may have been applied if the Global IP address is deleted and returned to the shared pool. Failure to do this may mean that DNS resolution may direct to another customer s vsys when the Global IP address is reissued from the shared pool. 2.8 Internet Connection Service The Internet Connection Service provides an environment for connecting to the Internet using global IP addresses for which the Customer has created. At least one global IP address is required to use the Internet Connection Service. The Charges for this aspect of the Service are based on the number of Global IP addresses utilised and on the amount of data transmitted. 2.9 IPsec VPN Gateway Connection Service The IPsec VPN gateway connection service provides a facility for establishing a secure network connection between a pair of IPsec gateways, either between two FUJITSU Cloud Service S5 Contracts/Regions or FUJITSU Cloud Service S5 Contract/Region and external Customer network or supported client (with suitable compatible network devices). This services uses standardised ISAKMP (Internet Security Association and Key Management Protocol) and IPsec tunnelling protocols. The Charges for this aspect of the Service are based on the hours of operation of the Gateway(s) on FUJITSU Cloud Service S System Template Service The System Template Service provides templates that allow Virtual Systems to be created with a single operation. Basic templates are provided on the Service Website for no charge. From time to time, Fujitsu may provide complex system templates, at additional cost which will be shown in the Service Website Management Fujitsu performs hardware monitoring and live monitoring of VMs (CPU/memory); the hypervisor ensures the performance of each VM. Customers can monitor (health check) their own virtual systems, the running status of the VMs and the running status of VMs in a load balance group through the portal and/or API, or with third party management tools. Date: 20/07/201 Page 11 of 18

12 2.12 Indicative Timings for Provisioning / De-Provisioning When the User deploys or withdraws virtual system resources, dynamic resource management will automatically execute the necessary processing in accordance with that virtual system description. Provisioning and deleting resources is performed within 30 minutes depending on the complexity of the system to be deployed or deleted. The platform is based on an entirely virtualized and fully Internet protocol (IP) based platform to provide virtual private datacentre functionality. The platform allows for the creation of separate logical networks within the IaaS platform in order to separate the infrastructure of different Customers. The platform also supports the secure linking of these networks to a Customer s own internal infrastructures via private connections through SSL VPN using HTTP and HTTPS services Open Source Software Used The platform is based upon the Open Source software Xen Hypervisor and CentOS/Ubuntu Linux operating system software within the service. The service uses Fujitsu s own extended hypervisor and management technology based on Xen. All physical servers in the service are equipped with Xen-based hypervisor virtualization technology above which guest VMs operate. The control of virtual resources is integrated with virtualization software on the physical servers, performing also network and storage virtualization and uniformly managing them all. For example, the storage virtualization is accomplished by loading a volume manager on top of the Xen management OS, and network migration is achieved by linking with server migration. Fujitsu works with and contributes to XCP (Xen Cloud Platform) to promote the open source platform Password Management The usage and restrictions of the passwords etc. used for login are shown in the following Table. Password Management Purpose Type Restrictions Password Secret Key PIN Login before certificates are issued Import of certificates to PCs Login using certificates Number of Characters None Password Complexity None None None Number of Mistakes Before Locking 6 times No limits No limits Validity Period 90 days 3 years 3 years Date: 20/07/201 Page 12 of 18

13 3. FURTHER INFORMATION 3.1 Signup and Credit Checking The Customer orders either Service via the appropriate Service home page e.g. or Customers requiring services from both UK instances of the platform, will need to sign up in the same way on both portals. The Customer enters their address where a unique link to the Customer s on-line application page and a temporary password is sent from the Service Platform. The customer is then presented with an on-line form for the collection of the customer s company and billing details. Once the Customer has completed the on-line application and agreed to the FUJITSU Cloud Service Agreement the Customer Account is created and limited access to the Service Website is given to the Customer. The customer will then be contacted via by Fujitsu Central Financial Services to either confirm that all information has satisfied Fujitsu s financial approval process or a request for clarification on the company information. On completion of this stage, Central Financial Services will confirm via the full activation of the customer s account. Approval gained to one service, will fast track approval for an application made on the secondary service at a later date. In the circumstances that the financial approval is not successful, Fujitsu will have no obligation to continue to provide the Customer with access to the Service and will be entitled to terminate the Service and the FUJITSU Cloud Service Agreement immediately. In the circumstances where the request comes from an internal Fujitsu applicant (i.e. an address with suffix), the applicant is directed to an alternative internal on-line form. The completed form will also be reviewed by Central Financial Services and a confirmation will be issued. 3.2 Cancellation To cancel the Customer account, all virtual resources must first be stopped and then returned to the Service by clicking Return All within the System Manager Console. Once this has been completed the FUJITSU Cloud Service Agreement Owner clicks on Cancel within the User Management Console to complete the cancellation process. The Cancel link is only visible to the FUJITSU Cloud Service Agreement Owner. Customers with more than one account, or accounts in both services will need to cancel each contract separately. 3.3 Invoicing and Charges Charging is based on the actual usage of the resources of the platform and charges are incurred from the point that usage of the resource starts. The charging basis varies for different types of resources, as set out in the table below: CHARGING TYPES Type Charging System Description Service TYPE-I Rate-based (1-hour Charges are based on the Virtual Machines units) period of utilisation. Global IP Address Service TYPE-II Rate-based (Monthly) Charges are incurred for the full month, even if the utilisation period is short. (Independent of number of VM CPU) TYPE- III TYPE- IV Rate-based (Monthly and Number of CPUs) Rate-based (Time and Capacity) Charges are incurred for the full month, even if the utilisation period is short. (Dependent on number of VM CPU) Charges are based on guaranteed capacity per hour. Server Load-Balancing Service Redundant FW/SLB services Turbo FW service IPsec VPN gateway service Operating System Licences such as Microsoft Windows Server, Red Hat Server VM Middleware Options [Microsoft SQL Server] System Disk Service Additional Disk Service Date: 20/07/201 Page 13 of 18

14 TYPE-V Usage amount Charges are based on the amount of data transmitted. TYPE- Usage counts Charges are incurred on a onetime VI basis for the use of a system template, at the time that the system is first created. Disk Service for System Backup Disk Service for Additional Disk Backup Template/Image Backup Service Snapshot service for System & Additional Disk Internet connection service System Template Service (Unit price varies by template type) Operating time is rounded up to the next hour. e.g. Operating time : 1H 45M -> 2H Network traffic is rounded down to the previous GB. e.g. Network traffic : 31.7GB -> 31GB Where several Virtual Systems exist within one contract, per-system charge totals are calculated, and then included in a single bill. For charge types I and IV usage periods within a month are summed, and the total period of usage is then rounded up to the next hour. 3.4 Service Levels Service Levels and Service Credits The target service level of the platform virtual resources is 99.95%. The Service Levels and Service Credits for the Service are set out in the Service Specification Service Management Fujitsu is an ITIL aligned and ISO/IEC conformant supplier, and deploys, manages and continually improves service management processes that are underpinned by standard technologies. The service management process that Fujitsu will deploy for managing the infrastructure has the key processes and functions listed below: Incident Management Change Management Availability Management Service Desk. Date: 20/07/201 Page 14 of 18

15 3.5 Support Service The Support Service is set out in the Service Specification. 3.6 Accreditations The UK instances are hosted in one of two Fujitsu owned and managed data centres which meet the Tier 3 criteria of the Uptime Institute. In additional the London North Data Centre is certified Gold in terms of both its Build and its Operational Sustainability by the Uptime Institute. Both data centres are secure and ensure the availability of their technical infrastructure, such as air conditioning, power supply and network connection. This data centres have numerous security certificates, qualifications and awards including the following: Accreditations: Management Standards: BS EN ISO 9001:2000 the international standard for Quality Management Systems ITIL (IT Infrastructure Library) the best practise framework for Service Delivery Management Accreditations: Security Standards: ISO (BS7799) the British Standard for Information Security Management ISO the International Standard for Information Security Management The UK FUJITSU Cloud Service S5 platforms are asserted by Fujitsu as suitable for usage by the Public Sector for OFFICIAL & OFFICIAL-SENSITIVE, dependent on any necessary associated controls required within the application running on the FUJITSU Cloud Service S5 platform Certifications: 3.7 Security Tier III Design certification from The Uptime Institute Tier III Build certification from The Uptime Institute The Uptime Institute Operational Sustainability GOLD standard (London North Data Centre Only). Log collection - In order to analyse the root cause of problems that may occur, Fujitsu collects logs of illegal accesses from outside, logs of operations by the Customer, and logs of work performed by Fujitsu. These logs are then stored for seven years from when they are collected. Fujitsu will not monitor the log collection for any other purpose than analysing the root cause of problems, for example when a call is raised to the Support Service helpdesk. 3.8 Access to and Use of the Service The Customer may access and use the Service as provided in the Service Specification. 3.9 Self Help Training The platform portal comes with a set of training materials and How-To guides which will enable Users to get up and running quickly. It is possible to configure and deploy test environments in a short period of time estimated at less than an hour from the beginning of the system design through to live production. The following training guides can be found on either Web Portal.: FAQ How to Guides Webinar Process to raise questions via the service desk Optional Cloud Consulting Services. Date: 20/07/201 Page 15 of 18

16 4. DEFINITIONS Term/ Abbreviation Core Service Service Portal System Manager Console Virtual IT Virtual System Virtual System Set Global IP Address Service Internet Connection Service Load Balancing Service System Template Service Virtual Private Networks FW SLB IDS IPS Definition The minimum service that can be contracted for. The website available only to Fujitsu Customers receiving the Service and which enables the Customer to use the Service. Web Portal graphical User interface for administrating, configuring and initiating remote connections to the Virtual IT. Virtual Information Technology Infrastructure. Means a collection of Virtual resources. Means the collection of all of the virtual systems used by the Customer in accordance with the FUJITSU Cloud Service Agreement. Provides global IP addresses that are required to perform Internet communications from the Virtual System The Internet Connection Service provides an environment for connecting to the Internet using global IP addresses for which the Customer has created and corresponds with private IP addresses The Load Balancing Service balances accesses to a single representative private IP address within a virtual system among multiple Virtual Machines that have been registered as a load balancing group The System Template Service provides templates that allow Virtual Systems to be created with a single operation (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual Users with secure access to their organization's network. Firewall Server Load Balancer Intrusion Detection System Intrusion Prevention System Date: 20/07/201 Page 16 of 18

17 5. ADDITIONAL DOCUMENTATION A comprehensive library of technical information and use cases is available for both Fujitsu personnel and Customers via either Web Portal and is the subject to continual development. Date: 20/07/201 Page 17 of 18

18 6. CHANGE CONTROL Version Date Author Reason for change st May nd Nov th March th July th December th July th Nov 2014 Simon Hallett Adam Jackson Andy Chafer Ian Purvis Simon Hallett Jeff Melman Jeff Melman Ian Purvis FGCP Service Overview issued. Moved to new template. New Double High Performance vsys added. Updated for Win 2012 templates, SQL 2012, CentOS Middleware, 200 vsys s per contract, password expiry period & registration process FUJITSU Cloud IaaS FUJITSU Cloud Service S5 name change. Service Release 9 (02Nov13) functionality updates: Double high 15 VM, 10TB disk size, 300 max FW rules, IPsec VPN gateway service, Backup in background. Service Release 11 (29Jun14) functionality updates: Redundant FW/SLB, Turbo FW, Additional disk snapshots, 800 max FW rules, FW/SLB Performance Monitoring, FW/SLB Log file import/save SR12 and Quad High Performance Types th Dec 2014 Ian Purvis Updated as a result of withdrawal of Windows st Jan th April th Sept th Dec th July 2016 Ian Purvis Ian Purvis Ian Purvis Ian Purvis Jeff Melman Change for 2 nd island and SR13 updates OFFICIAL and OFFICAL SENSTIVE added Swapped around order of Portal URLs Added IDS/IPS, extended performance bandings and VM export capability following release of SR14 FUJITSU Cloud Service S5 name change Date: 20/07/201 Page 18 of 18

Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT

Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Contents 1 Cloud+ IaaS Pricing...2 1.1 Service Pricing Guide... Error! Bookmark not defined. 1.2 Cloud+ Networking Pricing...

More information

Cloud Services. Introduction

Cloud Services. Introduction Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient

More information

FUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC.

FUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC. FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 FUJITSU AMERICA, INC. 1 FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 Date of publish: September, 2011 All Rights Reserved, Copyright FUJITSU

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud UK Region Price List (November 2017) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud UK Region Price List (May 2017) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption basis

More information

This component of K5 IaaS provides a virtual infrastructure accessible via the Internet within which physical computers are divided using virtualizati

This component of K5 IaaS provides a virtual infrastructure accessible via the Internet within which physical computers are divided using virtualizati FUJITSU Cloud Service K5 - IaaS Service Description September 28, 2017 1. General Overview The FUJITSU Cloud Service K5 is provided via a standardized platform and common architecture, which is deployed

More information

FUJITSU Cloud Service K5 - IaaS Service Description February 15, 2017

FUJITSU Cloud Service K5 - IaaS Service Description February 15, 2017 FUJITSU Cloud Service K5 - IaaS Service Description February 15, 2017 1. General Overview The FUJITSU Cloud Service K5 is provided via a standardized platform and common architecture, which is deployed

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud UK Region Price List (March 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud Germany Region Price List (December 2017) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud UK Region Price List (March 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud Finland Region Price List (April 2017) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud US Region Price List (March 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud US Region Price List (February 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

FUJITSU Cloud Service S5 Modifying Virtual Resources

FUJITSU Cloud Service S5 Modifying Virtual Resources FUJITSU Cloud Service S5 Modifying Virtual Resources This guide describes the process for modifying virtual resources on the FUJITSU Cloud Service S5 platform How to Modify a Virtual System A Virtual System

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud Germany Region Price List (March 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

Fujitsu On-demand Virtual System Service Service Catalogue

Fujitsu On-demand Virtual System Service Service Catalogue Fujitsu On-demand Virtual System Service Service Catalogue Nov. 16 th, 2010 FUJITSU LIMITED 1 Service outline Fujitsu DC Provide the allocated private virtual system environment. Internet Resource pool

More information

Fujitsu Global Cloud Platform Service Catalog

Fujitsu Global Cloud Platform Service Catalog Fujitsu Global Cloud Platform Service Catalog October, 2011 Fujitsu America, Inc. NOTE: This presentation is only a summary and does not constitute a legal contract. Please see the terms and conditions

More information

FUJITSU Cloud Service S5 Modifying Virtual Resources

FUJITSU Cloud Service S5 Modifying Virtual Resources FUJITSU Cloud Service S5 Modifying Virtual Resources This guide describes the process for modifying virtual resources in the FUJITSU Cloud Service S5 Before you start 1. Select My Portal from the Start-Up

More information

Fujitsu Global Cloud Platform Service Catalogue

Fujitsu Global Cloud Platform Service Catalogue Fujitsu Global Cloud Platform Service Catalogue Fujitsu Asia Pte Ltd V1.56 All Rights Reserved, Copyright FUJITSU ASIA PTE LTD 2011 1 V1.56 All Rights Reserved, Copyright FUJITSU ASIA PTE LTD 2011 Copyright

More information

FGCP/S5. Introduction Guide. Ver. 2.3 FUJITSU LIMITED

FGCP/S5. Introduction Guide. Ver. 2.3 FUJITSU LIMITED FGCP/S5 Introduction Guide Ver. 2.3 FUJITSU LIMITED FGCP/S5 Instruction Guide Ver. 2.3 Date of publish: July, 2012 All Rights Reserved, Copyright FUJITSU LIMITED No reproduction or republication without

More information

FUJITSU Cloud Service S5 Creating, Modifying and Deleting Virtual Systems

FUJITSU Cloud Service S5 Creating, Modifying and Deleting Virtual Systems FUJITSU Cloud Service S5 Creating, Modifying and Deleting Virtual Systems This guide describes the process for creating and deleting FUJITSU Cloud Service S5 virtual systems How to Create a New Virtual

More information

MyCloud Computing Business computing in the cloud, ready to go in minutes

MyCloud Computing Business computing in the cloud, ready to go in minutes MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing

More information

FUJITSU Cloud Service K5 for Public & Virtual Private Cloud Japan Region Price List (October 2016) IaaS. IaaS. Virtual Server

FUJITSU Cloud Service K5 for Public & Virtual Private Cloud Japan Region Price List (October 2016) IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud Japan Region Price List (October 2016) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

Service Description CloudCore

Service Description CloudCore CloudCore TITLE: CloudCore DOCUMENT REF NO: QMS REC117 DESCRIPTION: Service description for the CloudCore service. OWNER / AUTHORITY: QMS / ISMS DOCUMENT CROSS REFERENCE: Director of Product and Service

More information

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8

More information

Service Description FUJITSU Cloud IaaS Trusted Public S5

Service Description FUJITSU Cloud IaaS Trusted Public S5 Service Description FUJITSU Cloud IaaS Trusted Public S5 LIST OF CONTENT 1 Introduction 3 2 Service Scope 4 2.1 Technology 4 2.1.1 System Template / Network Environment 4 2.1.2 Server elements 5 2.1.3

More information

ElasterStack 3.2 User Administration Guide - Advanced Zone

ElasterStack 3.2 User Administration Guide - Advanced Zone ElasterStack 3.2 User Administration Guide - Advanced Zone With Advance Zone Configuration TCloud Computing Inc. 6/22/2012 Copyright 2012 by TCloud Computing, Inc. All rights reserved. This document is

More information

VMware vcloud Air User's Guide

VMware vcloud Air User's Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Service Portal User Guide

Service Portal User Guide FUJITSU Cloud Service K5 IaaS Service Portal User Guide Version 1.4 FUJITSU LIMITED All Rights Reserved, Copyright FUJITSU LIMITED 2015-2016 K5IA-DC-M-005-001E Preface Purpose of This Manual This manual

More information

customer FAQs CLOUD NATIVE INFRASTRUCTURE Service Instances (VMs) information contained in a virtual machine disk image.

customer FAQs CLOUD NATIVE INFRASTRUCTURE Service Instances (VMs) information contained in a virtual machine disk image. CLOUD NATIVE INFRASTRUCTURE Service Q What is the service? Cloud Native Infrastructure from UKCloud is an OpenStack powered Infrastructure as a Service (IaaS) offering which enables organisations to rapidly

More information

Ordering and deleting Single-node Trial for VMware vcenter Server on IBM Cloud instances

Ordering and deleting Single-node Trial for VMware vcenter Server on IBM Cloud instances Ordering and deleting Single-node Trial for VMware vcenter Server on IBM Cloud instances The Single-node Trial for VMware vcenter Server on IBM Cloud is a single-tenant hosted private cloud that delivers

More information

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

Asset Bank - Shared Hosting. Service Description

Asset Bank - Shared Hosting. Service Description Asset Bank - Shared Hosting Service Description Date: 12th December 2016 Version: Status: d19 Released Introduction This document describes Bright Interactive s Shared Hosting Service, the hosting environment

More information

Revera Vault provides large scale, highly, durable, object based storage infrastructure designed for mission-critical and primary data.

Revera Vault provides large scale, highly, durable, object based storage infrastructure designed for mission-critical and primary data. Homeland Business Cloud Homeland Business Cloud provides key information technology solutions designed to help run your business, releasing you from technology decisions in order to focus on what s important.

More information

FUJITSU Cloud Service S5 Service Catalog

FUJITSU Cloud Service S5 Service Catalog FUJITSU Cloud Service S5 Service Catalog April, 2017 FUJITSU LIMITED NOTE: This presentation is only a summary and does not constitute a legal contract. Please see the terms and conditions of your services

More information

Overview Cobweb s Acronis Backup Cloud service is a comprehensive, yet simple, flexible and cost-effective cloud backup solution.

Overview Cobweb s Acronis Backup Cloud service is a comprehensive, yet simple, flexible and cost-effective cloud backup solution. Overview Cobweb s service is a comprehensive, yet simple, flexible and cost-effective cloud backup solution. is an easy-to-use, cloud backup storage solution that enables companies to backup files, folders,

More information

Echidna Concepts Guide

Echidna Concepts Guide Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.5.3 Revision A Contents About this release on page 2 System requirements on page 2 Build number and checksums on page 4 Compatibility on page 5 New features

More information

FUJITSU Cloud Service K5 - API Management Service Description

FUJITSU Cloud Service K5 - API Management Service Description FUJITSU Cloud Service K5 - API Management Service Description March 22, 2018 1. API Management Service Overview API Management Service is built on Apigee Edge, an integrated API platform product provided

More information

FUJITSU Cloud Service K5 - API Management Service Description

FUJITSU Cloud Service K5 - API Management Service Description FUJITSU Cloud Service K5 - API Management Service Description August 8, 2018 1. API Management Service Overview API Management Service is built on Apigee Edge, an integrated API platform product provided

More information

The OnApp Cloud Platform

The OnApp Cloud Platform The OnApp Cloud Platform Everything you need to sell cloud, dedicated, CDN, storage & more 286 Cores / 400 Cores 114 Cores 218 10 86 20 The complete cloud platform for service providers OnApp software

More information

ConRes IaaS Management Services for Microsoft Azure

ConRes IaaS Management Services for Microsoft Azure ConRes IaaS Management Services for Microsoft Azure Table of Contents 1. 2. 3. 4. 5. 6. 7. Introduction... 3 Pre-requisites... 3 Onboarding Infrastructure to ConRes IaaS Management Services for Azure...

More information

Citrix CloudPlatform (powered by Apache CloudStack) Version 4.5 Concepts Guide

Citrix CloudPlatform (powered by Apache CloudStack) Version 4.5 Concepts Guide Citrix CloudPlatform (powered by Apache CloudStack) Version 4.5 Concepts Guide Revised January 30, 2015 06:00 pm IST Citrix CloudPlatform Citrix CloudPlatform (powered by Apache CloudStack) Version 4.5

More information

ICBA Migration to IaaS Cloud Platform REQUEST FOR PROPOSAL

ICBA Migration to IaaS Cloud Platform REQUEST FOR PROPOSAL INTERNATIONAL CENTER FOR BIOSALINE AGRICULTURE ICBA Migration to IaaS Cloud Platform REQUEST FOR PROPOSAL Imane Boujidane Procurement Officer +971 4 336 1100 ext. 201 i.boujidane@biosaline.org.ae International

More information

FUJITSU Cloud Service S5

FUJITSU Cloud Service S5 FUJITSU Cloud Service S5 Basic System Setup Windows 2008 and 2012 VMs This guide documents the basic configuration that should be performed to a vsys and VM in order to configure the standard London East

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

VMware vcloud Air Key Concepts

VMware vcloud Air Key Concepts vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE UNITED KINGDOM

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE UNITED KINGDOM TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE UNITED KINGDOM WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including

More information

Features Handbook. FUJITSU Cloud Service K5 IaaS. Version 2.21 FUJITSU LIMITED. All Rights Reserved, Copyright FUJITSU LIMITED

Features Handbook. FUJITSU Cloud Service K5 IaaS. Version 2.21 FUJITSU LIMITED. All Rights Reserved, Copyright FUJITSU LIMITED FUJITSU Cloud Service K5 IaaS Features Handbook Version 2.21 FUJITSU LIMITED All Rights Reserved, Copyright FUJITSU LIMITED 2015-2018 K5IA-DC-M-004-016E Preface Purpose of This Manual This document explains

More information

VMware AirWatch Content Gateway Guide For Linux

VMware AirWatch Content Gateway Guide For Linux VMware AirWatch Content Gateway Guide For Linux AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

FUJITSU Storage ETERNUS AF series and ETERNUS DX S4/S3 series

FUJITSU Storage ETERNUS AF series and ETERNUS DX S4/S3 series Utilizing VMware vsphere Virtual Volumes (VVOL) with the FUJITSU Storage ETERNUS AF series and ETERNUS DX S4/S3 series Reference Architecture for Virtual Platforms (15VM/iSCSI) The ETERNUS AF series and

More information

CIT 668: System Architecture. Amazon Web Services

CIT 668: System Architecture. Amazon Web Services CIT 668: System Architecture Amazon Web Services Topics 1. AWS Global Infrastructure 2. Foundation Services 1. Compute 2. Storage 3. Database 4. Network 3. AWS Economics Amazon Services Architecture Regions

More information

How to Lift-and-Shift a Line of Business Application onto Google Cloud Platform

How to Lift-and-Shift a Line of Business Application onto Google Cloud Platform How to Lift-and-Shift a Line of Business Application onto Google Cloud Platform by Andy Wu, Solutions Architect, Magenic White Paper How to Lift-and-Shift a Line of Business Application onto Google Cloud

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide June, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

Data Security & Operating Environment

Data Security & Operating Environment Data Security & Operating Environment Version 1.0, Summer 2018 Last updated: June 21, 2018 https://www.kintone.com/contact/ Contents 1. Service Level Objective (SLO)... 1 2. Availability and Reliability...

More information

SERVERS TO SERVICES HOW MICROSOFT AZURE CAN MODERNISE YOUR IT INFRASTRUCTURE. Joey Lau 9 November 2017

SERVERS TO SERVICES HOW MICROSOFT AZURE CAN MODERNISE YOUR IT INFRASTRUCTURE. Joey Lau 9 November 2017 SERVERS TO SERVICES HOW MICROSOFT AZURE CAN MODERNISE YOUR IT INFRASTRUCTURE Joey Lau 9 November 2017 jlau@infoxchange.org 1 Technology for social justice www.infoxchange.org Sign up for your $5000 Azure

More information

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification

More information

FUJITSU Cloud Service K5 IaaS Service Portal User Guide

FUJITSU Cloud Service K5 IaaS Service Portal User Guide FUJITSU Cloud Service K5 IaaS Service Portal User Guide Version 2.8 FUJITSU LIMITED Preface Purpose of This Document This guide describes the operating procedures of the IaaS Service Portal for the services

More information

VMware AirWatch Content Gateway Guide for Linux For Linux

VMware AirWatch Content Gateway Guide for Linux For Linux VMware AirWatch Content Gateway Guide for Linux For Linux Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

A Cloud WHERE PHYSICAL ARE TOGETHER AT LAST

A Cloud WHERE PHYSICAL ARE TOGETHER AT LAST A Cloud WHERE PHYSICAL AND VIRTUAL STORAGE ARE TOGETHER AT LAST Not all Cloud solutions are the same so how do you know which one is right for your business now and in the future? NTT Communications ICT

More information

70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure

70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure 70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure Slide 1 Creating the Virtualization Infrastructure Slide 2 Introducing Microsoft System Center

More information

Statement of Compliance Cloud Platform

Statement of Compliance Cloud Platform Bidder Name Statement of Compliance Cloud Platform S. No. Functional Requirements of Virtual Private Cloud and Hybrid Cloud Platform Cloud services 1 Cloud services for both Windows hyper-v and Vmware

More information

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide The Balabit s Privileged Session Management 5 F5 Azure Reference Guide March 12, 2018 Abstract Administrator Guide for Balabit s Privileged Session Management (PSM) Copyright 1996-2018 Balabit, a One Identity

More information

Virtual Appliance User s Guide

Virtual Appliance User s Guide Cast Iron Integration Appliance Virtual Appliance User s Guide Version 4.5 July 2009 Cast Iron Virtual Appliance User s Guide Version 4.5 July 2009 Copyright 2009 Cast Iron Systems. All rights reserved.

More information

Cogeco Peer 1 Mission Critical Cloud

Cogeco Peer 1 Mission Critical Cloud Cogeco Peer 1 Mission Critical Cloud Enterprise-ready, policy driven cloud Many IT and application development organizations have struggled to embrace the Cloud in a meaningful and beneficial way. To gain

More information

21CTL Disaster Recovery, Workload Mobility and Infrastructure as a Service Proposal. By Adeyemi Ademola E. Cloud Engineer

21CTL Disaster Recovery, Workload Mobility and Infrastructure as a Service Proposal. By Adeyemi Ademola E. Cloud Engineer 21CTL Disaster Recovery, Workload Mobility and Infrastructure as a Service Proposal By Adeyemi Ademola E. Cloud Engineer 1 Contents Introduction... 5 1.2 Document Purpose and Scope...5 Service Definition...

More information

PCS Cloud Solutions. Create highly-available, infinitely-scalable applications and APIs

PCS Cloud Solutions. Create highly-available, infinitely-scalable applications and APIs PCS Cloud Solutions Create highly-available, infinitely-scalable applications and APIs Develop, package, and deploy powerful applications and services to the cloud with Cloud Services and the click of

More information

Dimension Data Public Cloud Rate Card

Dimension Data Public Cloud Rate Card Dimension Data Public Cloud Rate Card Dimension Data Public Cloud pricing offers unrivalled value and flexibility with no vendor lock-in. Whether you are a developer, small business or a multinational

More information

Clearswift Hosting Options

Clearswift Hosting Options Clearswift Hosting Options Frequently Asked Questions White paper V0.2 January 2016 Clearswift 2016 www.clearswift.com Contents 1. Overview 3 1.1 Why is Clearswift offering a hosting option? 3 1.2 Can

More information

Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud

Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud 2 Orchestrate the Cloud Infrastructure Business Drivers for Cloud Long Provisioning Times for New Services o o o Lack

More information

Relational Database Service. User Guide. Issue 05 Date

Relational Database Service. User Guide. Issue 05 Date Issue 05 Date 2017-02-08 Contents Contents 1 Introduction... 1 1.1 Concepts... 2 1.1.1 RDS... 2 1.1.2 DB Cluster... 2 1.1.3 DB Instance... 2 1.1.4 DB Backup... 3 1.1.5 DB Snapshot... 3 1.2 RDS DB Instances...

More information

SoftLayer Security and Compliance:

SoftLayer Security and Compliance: SoftLayer Security and Compliance: How security and compliance are implemented and managed Introduction Cloud computing generally gets a bad rap when security is discussed. However, most major cloud providers

More information

NGF0502 AWS Student Slides

NGF0502 AWS Student Slides NextGen Firewall AWS Use Cases Barracuda NextGen Firewall F Implementation Guide Architectures and Deployments Based on four use cases Edge Firewall Secure Remote Access Office to Cloud / Hybrid Cloud

More information

Networks - Technical specifications of the current networks features used vs. those available in new networks.

Networks - Technical specifications of the current networks features used vs. those available in new networks. APPENDIX V TECHNICAL EVALUATION GUIDELINES Where applicable, the following guidelines will be applied in evaluating the system proposed by a service provider: TABLE 1: HIGH LEVEL COMPONENTS Description

More information

FUJITSU Cloud Service S5 Managing Templates and Images

FUJITSU Cloud Service S5 Managing Templates and Images FUJITSU Cloud Service S5 Managing Templates and Images This guide describes the process for creating and using Templates and Images on the platform. The platform allows you to clone your Virtual Machines

More information

Session 7: Configuration Manager

Session 7: Configuration Manager Session 7: Configuration Manager Mark Aslett Consultant Adam Shepherd Consultant MCS Talks Infrastructure Architecture Agenda Introduction Gathering requirements Core Concepts Hierarchy Design Scaling

More information

1V0-602.exam. Number: 1V0-602 Passing Score: 800 Time Limit: 120 min. Vmware 1V VMware Certified Associate 6 Hybrid Cloud Fundamentals

1V0-602.exam. Number: 1V0-602 Passing Score: 800 Time Limit: 120 min. Vmware 1V VMware Certified Associate 6 Hybrid Cloud Fundamentals 1V0-602.exam Number: 1V0-602 Passing Score: 800 Time Limit: 120 min Vmware 1V0-602 VMware Certified Associate 6 Hybrid Cloud Fundamentals Exam 9 QUESTION 1 Which three options are underlying networking

More information

1 Data Center Requirements

1 Data Center Requirements 1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider

More information

Virtual Private Cloud. User Guide. Issue 03 Date

Virtual Private Cloud. User Guide. Issue 03 Date Issue 03 Date 2016-10-19 Change History Change History Release Date What's New 2016-10-19 This issue is the third official release. Modified the following content: Help Center URL 2016-07-15 This issue

More information

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Master Services Agreement:

Master Services Agreement: This Service Schedule for Hosted Virtual Server Services v8.0.0 (the Service ) replaces all previously signed / incorporated version(s) of the Service Schedule for Hosted Hyper-V Services and/or Hosted

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Azure Compute. Azure Virtual Machines

Azure Compute. Azure Virtual Machines Azure Compute Azure Virtual Machines Virtual Machines Getting started Select image and VM size New disk persisted in storage Management portal Windows Server Boot VM from new disk >_ Scripting (Windows,

More information

Flexible Computing Advanced User Guide

Flexible Computing Advanced User Guide Flexible Computing Advanced User Guide Version September 2015 proprietary notice copyright, France Telecom Group 2010. All rights reserved. confidentiality All information contained in this document is

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE

EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE Solution Overview Last Updated August 2, 2012 Prepare for the worst-case scenario with the efolder continuity cloud. Downtime of critical infrastructure can

More information

Introducing VMware Validated Designs for Software-Defined Data Center

Introducing VMware Validated Designs for Software-Defined Data Center Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design for Software-Defined Data Center 4.0 This document supports the version of each product listed and supports

More information

SaaSaMe Transport Workload Snapshot Export for. Alibaba Cloud

SaaSaMe Transport Workload Snapshot Export for. Alibaba Cloud SaaSaMe Transport Workload Snapshot Export for Alibaba Cloud Contents About This Document... 3 Revision History... 3 Workload Snapshot Export for Alibaba Cloud... 4 Workload Snapshot Export Feature...

More information

Get started with ReVirt

Get started with ReVirt Get started with ReVirt Index ReVirt 4 Key benefits 4 any.cloud and Veeam 4 Handling your data 4 Payment and upgrades 5 Trial subscription 5 Terms for resellers 5 Veeam licenses 5 Safety with Veeam Cloud

More information

Service Description Server Patching

Service Description Server Patching Server Patching TITLE: DESCRIPTION: Service Description Server Patching DOCUMENT REF NO: Service description for the Server Patching service. QMS REC132 OWNER / AUTHORITY: QMS / ISMS DOCUMENT CROSS REFERENCE:

More information

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

White Paper The simpro Cloud

White Paper The simpro Cloud White Paper The simpro Cloud White Paper The simpro Cloud Executive Summary... 1 Cloud Overview... 1 Global Data Centre Network... 2 Cloud Architecture... 3 Primary Objectives... 3 Data Security... 4 Certification

More information

Information Security Policy

Information Security Policy Information Security Policy Information Security is a top priority for Ardoq, and we also rely on the security policies and follow the best practices set forth by AWS. Procedures will continuously be updated

More information

CloudStack Administration Guide

CloudStack Administration Guide CloudStack Administration Guide For CloudStack Version 3.0.0 3.0.2 Revised August 16, 2012 4:41 PM 2011, 2012 Citrix Systems, Inc. All rights reserved. Specifications are subject to change without notice.

More information

SAP HANA. HA and DR Guide. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.

SAP HANA. HA and DR Guide. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 03 Date 2018-05-23 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Implementing Microsoft Azure Infrastructure Solutions OD20533C; On-Demand, Video-based Course Description This course is intended for IT professionals who are familiar with managing on-premises IT deployments

More information